×

Warning

The provided API key is invalid.

IQC-QuICS Math-CS Seminar: Srijita Kundu

Description

Title: A direct product theorem for quantum communication complexity with applications to device-independent QKD
Speaker: Srijita Kundu (University of Waterloo)
Time: Thursday, January 27, 2022 - 2:00pm
Location: Virtual Via Zoom: https://uwaterloo.zoom.us/j/98736830982?pwd=d212aDVlZU8vaHUxTkJkeWVFSGRLZz09

We give a direct product theorem for the entanglement-assisted interactive quantum communication complexity in terms of the quantum partition bound for product distributions. The quantum partition or efficiency bound is a lower bound on communication complexity, a non-distributional version of which was introduced by Laplante, Lerays and Roland (2012). For a two-input boolean function, the best result for interactive quantum communication complexity known previously was due to Sherstov (2018), who showed a direct product theorem in terms of the generalized discrepancy. While there is no direct relationship between the maximum distributional quantum partition bound for product distributions, and the generalized discrepancy method, unlike Sherstov’s result, our result works for two-input functions or relations whose outputs are non-boolean as well.

As an application of our result, we show that it is possible to do device-independent quantum key distribution (DIQKD) without the assumption that devices do not leak any information after inputs are provided to them. We analyze the DIQKD protocol given by Jain, Miller and Shi (2020), and show that when the protocol is carried out with devices that are compatible with several copies of the Magic Square game, it is possible to extract a linear (in the number of copies of the game) amount of key from it, even in the presence of a linear amount of leakage. Our security proof is parallel, i.e., the honest parties can enter all their inputs into their devices at once, and works for a leakage model that is arbitrarily interactive, i.e., the devices of the honest parties Alice and Bob can exchange information with each other and with the eavesdropper Eve in any number of rounds, as long as the total number of bits or qubits communicated is bounded.

Based on https://arxiv.org/abs/2106.04299, which is joint work with Rahul Jain.