Skip to main content

On the Impossibility of Extracting Classical Randomness Using a Quantum Computer

  • Conference paper
Automata, Languages and Programming (ICALP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4052))

Included in the following conference series:

  • 5442 Accesses

Abstract

In this work we initiate the question of whether quantum computers can provide us with an almost perfect source of classical randomness, and more generally, suffice for classical cryptographic tasks, such as encryption. Indeed, it was observed [SV86, MP91, DOPS04] that classical computers are insufficient for either one of these tasks when all they have access to is a realistic imperfect source of randomness, such as the Santha-Vazirani source.

We answer this question in the negative, even in the following very restrictive model. We generously assume that quantum computation is error-free, and all the errors come in the measurements. We further assume that all the measurement errors are not only small but also detectable: namely, all that can happen is that with a small probability p  ⊥ δ the (perfectly performed) measurement will result in some distinguished symbol ⊥ (indicating an “erasure”). Specifically, we assume that if an element x was supposed to be observed with probability p x , in reality it might be observed with probability p x ′∈[(1–δ)p x ,p x ], for some small δ>0 (so that p  ⊥ = 1 – ∑ x p x ′ ≤δ).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajtai, M., Linial, N.: Miklós Ajtai and Nathal Linial. The influence of large coalitions 13(2), 129–145 (1993)

    MATH  MathSciNet  Google Scholar 

  2. Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210–229 (1988)

    Article  MathSciNet  Google Scholar 

  3. Barak, B., Impagliazzo, R., Wigderson, A.: Extracting randomness from few independent sources. In: Proc. 45th FOCS (2004)

    Google Scholar 

  4. Blum, M.: Independent unbiased coin flips from a correlated biased source—a finite state Markov chain. Combinatorica 6(2), 97–108 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  5. Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Proc. EUROCRYPT 2000, pp. 453–469 (2000)

    Google Scholar 

  6. Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230–261 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  7. Chor, B., Goldreich, O., Håstad, J., Friedman, J., Rudich, S., Smolensky, R.: The bit extraction problem of t-resilient functions. In: Proc. 26th FOCS, pp. 396–407. IEEE Computer Society Press, Los Alamitos (1985)

    Google Scholar 

  8. John, F.: Clauser and Michael A. Horne, Experimental consequences of objective local theories, Phys. Rev. D 10, 526–535 (1974)

    Google Scholar 

  9. Dodis, Y.: New Imperfect Random Source with Applications to Coin-Flipping. In: ICALP 2001, pp. 297–309 (2001)

    Google Scholar 

  10. Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved randomness extraction from two independent sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) RANDOM 2004 and APPROX 2004. LNCS, vol. 3122, Springer, Heidelberg (2004)

    Google Scholar 

  11. Dodis, Y., Oliveira, R.: On extracting private randomness over a public channel. In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol. 2764, pp. 252–263. Springer, Heidelberg (2003)

    Google Scholar 

  12. Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: Proc. FOCS 2004, pp. 196–205 (2004)

    Google Scholar 

  13. Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposure-resilient cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 301–324. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Dodis, Y., Spencer, J.: On the (non)Universality of the One-Time Pad. In: Proc. FOCS 2002, pp. 376–385 (2002)

    Google Scholar 

  15. Elias, P.: The efficient construction of an unbiased random sequence. Ann. Math. Stat. 43(2), 865–870 (1972)

    Article  MATH  Google Scholar 

  16. Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: Proc. 35th FOCS, pp. 92–101 (2003)

    Google Scholar 

  17. Lichtenstein, D., Linial, N., Saks, M.: Some extremal problems arising from discrete control processes. Combinatorica 9(3), 269–287 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  18. Marshall, T.W., Santos, E., Selleri, F.: Local realism has not been refuted by atomic-cascade experiments. Phys. Lett. A 98, 5–9 (1983)

    Article  Google Scholar 

  19. Massar, S.N.: locality, closing the detection loophole and communication complexity. Phys. Rev. A 65, 32121 (2002)

    Article  MathSciNet  Google Scholar 

  20. McInnes, J.L., Pinkas, B.: On the impossibility of private key cryptography with weakly random keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421–436. Springer, Heidelberg (1991)

    Google Scholar 

  21. Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  22. Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  23. Reingold, O., Vadhan, S., Wigderson, A.: A note on extracting randomness from Santha-Vazirani sources. In: Unpublished manuscript (2004)

    Google Scholar 

  24. Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci. 33(1), 75–87 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  25. Trevisan, L., Vadhan, S.: Extracting randomness from samplable distributions. In: Proc. 41st FOCS, pp. 32–42 (2000)

    Google Scholar 

  26. Vazirani, U.V.: Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources. Combinatorica 7(4), 375–392 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  27. Vazirani, U.V.: Efficiency considerations in using semi-random sources. In: Proc. 19th STOC, pp. 160–168 (1987)

    Google Scholar 

  28. von Neumann, J.: Various techniques used in connection with random digits. National Bureau of Standards 12, 36–38 (1951)

    Google Scholar 

  29. Vaziraniand Vijay, U.V., Vazirani, V.: Random polynomial time is equal to slightly-random polynomial time. In: Vazirani, U.V., V. Vazirani, V. (eds.) Proc. 26th FOCS, pp. 417–428 (1985)

    Google Scholar 

  30. Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16(4/5), 367–391 (1996)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dodis, Y., Renner, R. (2006). On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds) Automata, Languages and Programming. ICALP 2006. Lecture Notes in Computer Science, vol 4052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787006_18

Download citation

  • DOI: https://doi.org/10.1007/11787006_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35907-4

  • Online ISBN: 978-3-540-35908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics