Short Corr TD 3
Short Corr TD 3
This TD corresponds to the content of Lecture 3: Security of Quantum Key Distribution. It will
cover optimal attacks for Eve, and in general bounds on achievable measurement.
The solution is either a direction on how to reach the conclusion, direct solution as an equation
or for open questions, the most important points
EXERCISE 1
Correctness and secrecy implies security
Solution of question 2.1. Alice randomly generates KA and announces it on the public chan-
nel. Bob and Eve holds a perfect copy of KA such that Pr(KA ̸= KB ) = 0 ensuring correctness
but obviously not secret since Eve also holds a copy of KA .
Solution of question 2.2. Alice randomly generates KA and Bob randomly generates KB . No
one announces anything on the public channels. Then, in the absence of any bias, Eve has no
information on Alice (or Bob) key but P (KA ̸= KB ) = 1 − 21n .
Solution of question 2.3. Alice and Bob always abort, with p⊥ = 1. By definition the protocol
is 0-secret and 0-correct.
EXERCISE 3
Security of the entanglement based version
1
||ρABE − |Φ+ ⟩ ⊗ ρE ||1 ≤ ϵ
2
Use the fact that when Alice measures her own part part of |Φ+ ⟩, whatever
P the basis, the resulting
state after the partial trace is the maximally mixed state ρU = s |s⟩ ⟨s| showing the required
result.
EXERCISE 4
Holevo’s bound
Pn
Solution of question 4.1. S(ρX ) = − x=1 px log(px ) = H(X).
Solution of question 4.6. E Q is a quantum channel so it can only decrease the quantum
mutual information
S(X : Q′ Y ) ≤ S(X : Q)
The trace can be seen as quantum channel so tracing out a subsystem can only decrease the
quantum mutual information
S(X : Y ) ≤ S(X : Q′ Y )
and hence
S(X : Y ) ≤ S(X : Q)
Solution of question 4.7.
Xn X
m n X
m
′
X
ρXY = TrQ′ ρXQ Y = px qy|x |x⟩ ⟨x| ⊗ |y⟩ ⟨y| = ρXY = px,y |x, y⟩ ⟨x, y|
x=1 y=1 X=1 y=1
Also
n n n
! !
X X X
Tr px log(px ) |x⟩ ⟨x| ⊗ ρx = Tr px log(px ) |x⟩ ⟨x| = px log(px ) = −H(X)
x=1 x=1 x=1
and
n n n
! !
X X X X
Tr px |x⟩ ⟨x| ⊗ ρx log(ρx ) = Tr px ρx log(ρx ) = px Tr(ρx log(ρx )) = − px S(ρx )
x=1 x=1 x=1 x
Iacc ≤ S(X : Q)
and using the previous question,
n
X
Iacc ≤ S(ρ) − px log(ρx )
x=1
EXERCISE 5
Extra - Trusted node
No correction (extra).