Robert König
California Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Robert König.
IEEE Transactions on Information Theory | 2009
Robert König; Renato Renner; Christian Schaffner
In this paper, we show that the conditional min-entropy <i>H</i> <sub>min</sub>(<i>A</i> |<i>B</i>) of a bipartite state <i>rhoAB</i> is directly related to the maximum achievable overlap with a maximally entangled state if only local actions on the <i>B</i>-part of <i>rhoAB</i> are allowed. In the special case where <i>A</i> is classical, this overlap corresponds to the probability of guessing <i>A</i> given <i>B</i>. In a similar vein, we connect the conditional max-entropy <i>H</i> <sub>max</sub>(<i>A</i> |<i>B</i>) to the maximum fidelity of <i>rhoAB</i> with a product state that is completely mixed on <i>A</i>. In the case where <i>A</i> is classical, this corresponds to the security of <i>A</i> when used as a secret key in the presence of an adversary holding <i>B</i>. Because min- and max-entropies are known to characterize information-processing tasks such as randomness extraction and state merging, our results establish a direct connection between these tasks and basic operational problems. For example, they imply that the (logarithm of the) probability of guessing <i>A</i> given <i>B</i> is a lower bound on the number of uniform secret bits that can be extracted from <i>A</i> relative to an adversary holding <i>B</i>.
theory of cryptography conference | 2005
Renato Renner; Robert König
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable key S in terms of the adversarys (quantum) knowledge about Z. Our result has applications in quantum cryptography. In particular, it implies that many of the known quantum key distribution protocols are universally composable.
Physical Review Letters | 2009
Matthias Christandl; Robert König; Renato Renner
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems. Our main result is that, in order to prove that a certain property holds for an arbitrary input, it is sufficient to consider the case where the input is a particular de Finetti-type state, i.e., a state which consists of n identical and independent copies of an (unknown) state on a single subsystem. Our technique can be applied to the analysis of information-theoretic problems. For example, in quantum cryptography, we get a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks. The resulting security bounds are tighter than previously known bounds obtained with help of the exponential de Finetti theorem.
IEEE Transactions on Information Theory | 2005
Robert König; Ueli Maurer; Renato Renner
We address the question whether quantum memory is more powerful than classical memory. In particular, we consider a setting where information about a random n-bit string X is stored in s classical or quantum bits, for s<n, i.e., the stored information is bound to be only partial. Later, a randomly chosen predicate F about X has to be guessed using only the stored information. The maximum probability of correctly guessing F(X) is then compared for the cases where the storage device is classical or quantum mechanical, respectively. We show that, despite the fact that the measurement of quantum bits can depend arbitrarily on the predicate F, the quantum advantage is negligible already for small values of the difference n-s. Our setting generalizes the setting of Ambainis et al. who considered the problem of guessing an arbitrary bit (i.e., one of the n bits) of X. An implication for cryptography is that privacy amplification by universal hashing remains essentially equally secure when the adversarys memory is allowed to be quantum rather than only classical. Since privacy amplification is a main ingredient of many quantum key distribution (QKD) protocols, our result can be used to prove the security of QKD in a generic way.
IEEE Transactions on Information Theory | 2012
Robert König; Stephanie Wehner; Jürg Wullschleger
We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to the cheating party. We construct novel protocols for oblivious transfer and bit commitment, and prove that realistic noise levels provide security even against the most general attack. Such unconditional results were previously only known in the so-called bounded-storage model which is a special case of our setting. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties.
Physical Review Letters | 2007
Robert König; Renato Renner; Andor Bariska; Ueli Maurer
The unconditional security of a quantum key distribution protocol is often defined in terms of the accessible information, that is, the maximum mutual information between the distributed key S and the outcome of an optimal measurement on the adversarys (quantum) system. We show that, even if this quantity is small, certain parts of the key S might still be completely insecure when S is used in applications, such as for one-time pad encryption. This flaw is due to a locking property of the accessible information: one additional (physical) bit of information might increase the accessible information by more than one bit.
Physical Review Letters | 2009
Robert König; Stephanie Wehner
A fully general strong converse for channel coding states that when the rate of sending classical information exceeds the capacity of a quantum channel, the probability of correctly decoding goes to zero exponentially in the number of channel uses, even when we allow code states which are entangled across several uses of the channel. Such a statement was previously only known for classical channels and the quantum identity channel. By relating the problem to the additivity of minimum output entropies, we show that a strong converse holds for a large class of channels, including all unital qubit channels, the d-dimensional depolarizing channel and the Werner-Holevo channel. This further justifies the interpretation of the classical capacity as a sharp threshold for information transmission.
Journal of Mathematical Physics | 2005
Robert König; Renato Renner
Consider a symmetric quantum state on an n-fold product space, that is, the state is invariant under permutations of the n subsystems. We show that, conditioned on the outcomes of an informationally complete measurement applied to a number of subsystems, the state in the remaining subsystems is close to having product form. This immediately generalizes the so-called de Finetti representation to the case of finite symmetric quantum states.
IEEE Transactions on Information Theory | 2011
Robert König; Renato Renner
Let <i>X</i><sub>1</sub>,..., <i>Xn</i> be a sequence of <i>n</i> classical random variables and consider a sample <i>Xs</i><sub>1</sub>,..., <i>Xsr</i> of <i>r</i> ≤ <i>n</i> positions selected at random. Then, except with (exponentially in <i>r</i>) small probability, the min-entropy <i>H</i><sub>min</sub>(<i>Xs</i><sub>1</sub> ...<i>Xsr</i>) of the sample is not smaller than, roughly, a fraction <sup>r</sup>/<sub>n</sub> of the overall entropy <i>H</i><sub>min</sub>(<i>X</i><sub>1</sub> ...<i>Xn</i>), which is optimal. Here, we show that this statement, originally proved in [S. Vadhan, LNCS 2729, Springer, 2003] for the purely classical case, is still true if the min-entropy <i>H</i><sub>min</sub> is measured relative to a quantum system. Because min-entropy quantifies the amount of randomness that can be extracted from a given random variable, our result can be used to prove the soundness of locally computable extractors in a context where side information might be quantum-mechanical. In particular, it implies that key agreement in the bounded-storage model-using a standard sample-and-hash protocol-is fully secure against quantum adversaries, thus solving a long-standing open problem.
IEEE Transactions on Information Theory | 2008
Robert König; Barbara M. Terhal
An extractor is a function that is used to extract randomness. Given an imperfect random source X and a uniform seed Y, the output E(X,Y) is close to uniform. We study properties of such functions in the presence of prior quantum information about X, with a particular focus on cryptographic applications. We prove that certain extractors are suitable for key expansion in the bounded-storage model where the adversary has a limited amount of quantum memory. For extractors with one-bit output we show that the extracted bit is essentially equally secure as in the case where the adversary has classical resources. We prove the security of certain constructions that output multiple bits in the bounded-storage model.