Skip to main content

Reductions to IID: Parallel Interaction

  • Chapter
  • First Online:
Device-Independent Quantum Information Processing

Part of the book series: Springer Theses ((Springer Theses))

  • 364 Accesses

Abstract

Multi-round parallel boxes, discussed in Sect. 6.1, can display an almost arbitrary behaviour and hence are complicated to analyse.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Depending on the context, the term system may refer to a probability distribution, a quantum state, or a box.

  2. 2.

    The mentioned theorems rely on some initial subsystem structure and/or a bound on the dimension of the subsystems. In the device-independent setting one cannot start with such assumptions regarding the considered boxes in general.

  3. 3.

    The definition and the derived theorem are independent of the nature of the box, i.e., if it is classical, quantum, non-signalling, or even signalling. This will be addressed in Sect. 8.2.

  4. 4.

    In a quantum de Finetti statement a permutation takes a state \( \left| {\phi _1} \right\rangle \otimes \dots \left| {\phi _n} \right\rangle \) to \( \left| {\phi _{\pi ^{-1}(1)}} \right\rangle \otimes \dots \left| {\phi _{\pi ^{-1}(n)}} \right\rangle \). That is, the quantum states themselves are being permuted.

  5. 5.

    Depending on the considered scenario, the application of the permutation may be a purely theoretical step or needs to be done in practice.

  6. 6.

    As previously mentioned, we focus on the case of two parties. The definition extends to any number of parties trivially.

  7. 7.

    In  [13], a more general version of Theorem 8.3 was proven, in which further symmetries of \(\mathrm {P}_{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\) (on top of permutation invariance) can be exploited to construct more structured de Finetti boxes and prove de Finetti reductions with improved parameters. Theorem 8.3 was then derived as a corollary. To keep things (relatively) concise, we present in this thesis a direct proof of Theorem 8.3.

  8. 8.

    A curious reader may already take a glimpse of Theorems 8.11 and 8.15.

  9. 9.

    Note that \(\tau _{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\) may be signalling, as in our previous statements. The fact that we are considering non-signalling extensions only means that the marginals \(\tau _{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\) and \(\tau _{C|Z}\) of \(\tau _{\textit{\textbf{A}}\textit{\textbf{B}}C|\textit{\textbf{X}}\textit{\textbf{Y}}Z}\) are well defined.

  10. 10.

    Linearity refers here to the linearity of the test in the box \(\mathrm {P}_{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\), which follows from the fact that the test interacts only once with \(\mathrm {P}_{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\) (or, in other words, the test gets only a single copy of the box).

  11. 11.

    Let us briefly explain why the notation of a test considered in Sect. 8.3.1 is not appropriate in the cryptographic setting. When considering tests, we were interested in events defined over \(\mathcal {X}^n\times \mathcal {Y}^n\times \mathcal {A}^n\times \mathcal {B}^n\). Whether an output of a protocol (a key, for example) is secure to use cannot be defined as an event. Security depends on the process of producing the key rather on the specific data that was produced during the run of the protocol.

  12. 12.

    Figure 8.4 is almost identical to Fig. 8.3, describing a test. The difference between the two scenarios lies in the quantity that we wish to bound; see the previous footnote.

  13. 13.

    Note, however, that the extension \(\tau _{\textit{\textbf{A}}\textit{\textbf{B}}C|\textit{\textbf{X}}\textit{\textbf{Y}}Z}\) itself cannot be written as a convex combination of IID boxes, only its marginal \(\tau _{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\) is a de Finetti box. Furthermore, \(\tau _{\textit{\textbf{A}}\textit{\textbf{B}}|\textit{\textbf{X}}\textit{\textbf{Y}}}\) may be signalling in general, as before.

  14. 14.

    Though this does not make them useless; see Chap. 10.

  15. 15.

    Weaker statements, e.g., with a pre-factor sub-exponential in n, may also be of interest in certain applications.

  16. 16.

    The hope here is that by adding the additional weight on non-quantum or signalling boxes one could account for the “gap” between Eq. (8.6) and the known parallel repetition results.

  17. 17.

    We present only the bipartite case; [20, Theorem 4.3] is stated for an arbitrary number of parties.

  18. 18.

    Reference [7] presented the first de Finetti reduction, i.e., an inequality relation between permutation invariant systems and de Finetti systems (all previous de Finetti-type theorems gave other types of relations between the two systems). The term “de Finetti reduction” was not used at that time and the authors chose the name “post-selection technique” as they first proved the quantum analogue of Lemma 8.6.

  19. 19.

    In the presence of certain types of symmetries (in addition to permutation invariance) one can derive such de Finetti reductions; see  [13].

  20. 20.

    In this language, the original result of de Finetti  [1] stated that all infinitely-exchangeable distributions (i.e., distributions that are n-exchangeable for any \(n\ge k\)) are equal to distributions of the form of a convex combination of IID distributions.

References

  1. de Finetti B (1969) Sulla proseguibilità di processi aleatori scambiabili. Rend Matem Trieste 53–67

    Google Scholar 

  2. Diaconis P, Freedman D (1980) Finite exchangeable sequences. Annal Probab 745–764

    Google Scholar 

  3. Raggio G, Werner R (1989) Quantum statistical mechanics of general mean field systems. Helv Phys Acta 62(8):980–1003

    MathSciNet  MATH  Google Scholar 

  4. Caves CM, Fuchs CA, Schack R (2002) Unknown quantum states: the quantum de-Finetti representation. J Math Phys 43:4537

    Article  ADS  MathSciNet  Google Scholar 

  5. Renner R (2007) Symmetry of large physical systems implies independence of subsystems. Nat Phys 3(9):645–649

    Article  Google Scholar 

  6. Christandl M, König R, Mitchison G, Renner R (2007) One-and-a-half quantum de Finetti theorems. Commun Math Phys 273(2):473–498

    Article  ADS  MathSciNet  Google Scholar 

  7. Christandl M, König R, Renner R (2009) Postselection technique for quantum channels with applications to quantum cryptography. Phys Rev Lett 102(2):020504

    Article  ADS  Google Scholar 

  8. Christandl M, Toner B (2009) Finite de Finetti theorem for conditional probability distributions describing physical theories. J Math Phys 50:042104

    Article  ADS  MathSciNet  Google Scholar 

  9. Brandao FG, Harrow AW (2013) Quantum de Finetti theorems under local measurements with applications. In: Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pp. 861–870. ACM

    Google Scholar 

  10. Leverrier A (2014) Composable security proof for continuous-variable quantum key distribution with coherent states. arXiv:1408.5689

  11. Christandl M, Renner R (2012) Reliable quantum state tomography. Phys Rev Lett 109(12):120403

    Article  ADS  Google Scholar 

  12. Berta M, Christandl M, Renner R (2011) The quantum reverse Shannon Theorem based on one-shot information theory. Commun Math Phys 306(3):579–615

    Article  ADS  MathSciNet  Google Scholar 

  13. Arnon-Friedman R, Renner R (2015) de Finetti reductions for correlations. J Math Phys 56(5):052203

    Article  ADS  MathSciNet  Google Scholar 

  14. Hänggi E, Renner R, Wolf S (2010) Efficient device-independent quantum key distribution. In: Advances in cryptology–EUROCRYPT 2010, pp 216–234. Springer

    Google Scholar 

  15. Hänggi E, Renner R (2010) Device-independent quantum key distribution with commuting measurements. arXiv:1009.1833

  16. Renner R (2010) Simplifying information-theoretic arguments by post-selection. In: NATO advanced research workshop quantum cryptography and computing: theory and implementation, vol 26, pp 66–75. IOS Press

    Google Scholar 

  17. Kitaev AY (1997) Quantum computations: algorithms and error correction. Russ Math Surv 52(6):1191–1249

    Article  MathSciNet  Google Scholar 

  18. Holmgren J, Yang L (2017) (a counterexample to) parallel repetition for non-signaling multi-player games. In: Electronic colloquium on computational complexity (ECCC), vol 24, p 178

    Google Scholar 

  19. Arnon-Friedman R, Renner R, Vidick T (2016) Non-signaling parallel repetition using de finetti reductions. IEEE Trans Inf Theory 62(3):1440–1457

    Article  MathSciNet  Google Scholar 

  20. Lancien C, Winter A (2016) Parallel repetition and concentration for (sub-)no-signalling games via a flexible constrained de finetti reduction. Chic J Theor Comput Sci (11)

    Google Scholar 

  21. Lancien C, Winter A (2017) Flexible constrained de finetti reductions and applications. J Math Phys 58(9):092203

    Article  ADS  MathSciNet  Google Scholar 

  22. Arnon-Friedman R, Ta-Shma A (2012) Limits of privacy amplification against nonsignaling memory attacks. Phys Rev A 86(6):062333

    Article  ADS  Google Scholar 

  23. Hänggi E, Renner R, Wolf S (2009) Quantum cryptography based solely on bell’s theorem. arXiv:0911.4171

  24. Diaconis P, Freedman D (1980) Finite exchangeable sequences. Ann Probab 745–764

    Google Scholar 

  25. König R, Renner R (2005) A de finetti representation for finite symmetric quantum states. J Math Phys 46(12):122108

    Article  ADS  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rotem Arnon-Friedman .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Arnon-Friedman, R. (2020). Reductions to IID: Parallel Interaction. In: Device-Independent Quantum Information Processing. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-030-60231-4_8

Download citation

Publish with us

Policies and ethics