pith. sign in

arxiv: 1203.2142 · v2 · pith:B5VDR32Dnew · submitted 2012-03-09 · 🪐 quant-ph · math-ph· math.MP

A Framework for Non-Asymptotic Quantum Information Theory

classification 🪐 quant-ph math-phmath.MP
keywords quantumentropiesinformationsmoothentropicentropyframeworkstates
0
0 comments X
read the original abstract

This thesis consolidates, improves and extends the smooth entropy framework for non-asymptotic information theory and cryptography. We investigate the conditional min- and max-entropy for quantum states, generalizations of classical R\'enyi entropies. We introduce the purified distance, a novel metric for unnormalized quantum states and use it to define smooth entropies as optimizations of the min- and max-entropies over a ball of close states. We explore various properties of these entropies, including data-processing inequalities, chain rules and their classical limits. The most important property is an entropic formulation of the asymptotic equipartition property, which implies that the smooth entropies converge to the von Neumann entropy in the limit of many independent copies. The smooth entropies also satisfy duality and entropic uncertainty relations that provide limits on the power of two different observers to predict the outcome of a measurement on a quantum system. Finally, we discuss three example applications of the smooth entropy framework. We show a strong converse statement for source coding with quantum side information, characterize randomness extraction against quantum side information and prove information theoretic security of quantum key distribution using an intuitive argument based on the entropic uncertainty relation.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Rigorous Security Proofs for Practical Quantum Key Distribution

    quant-ph 2026-04 unverdicted novelty 7.0

    Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.

  2. Generalized Numerical Framework for Improved Finite-Sized Key Rates with R\'enyi Entropy

    quant-ph 2025-02 unverdicted novelty 5.0

    Authors provide analytical bound and gradient for Rényi quantities to extend numerical QKD finite-key optimization, reporting gains in high-loss low-block regimes.