Abstract
In this work we initiate the question of whether quantum computers can provide us with an almost perfect source of classical randomness, and more generally, suffice for classical cryptographic tasks, such as encryption. Indeed, it was observed [SV86, MP91, DOPS04] that classical computers are insufficient for either one of these tasks when all they have access to is a realistic imperfect source of randomness, such as the Santha-Vazirani source.
We answer this question in the negative, even in the following very restrictive model. We generously assume that quantum computation is error-free, and all the errors come in the measurements. We further assume that all the measurement errors are not only small but also detectable: namely, all that can happen is that with a small probability p ⊥ ≤δ the (perfectly performed) measurement will result in some distinguished symbol ⊥ (indicating an “erasure”). Specifically, we assume that if an element x was supposed to be observed with probability p x , in reality it might be observed with probability p x ′∈[(1–δ)p x ,p x ], for some small δ>0 (so that p ⊥ = 1 – ∑ x p x ′ ≤δ).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ajtai, M., Linial, N.: Miklós Ajtai and Nathal Linial. The influence of large coalitions 13(2), 129–145 (1993)
Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210–229 (1988)
Barak, B., Impagliazzo, R., Wigderson, A.: Extracting randomness from few independent sources. In: Proc. 45th FOCS (2004)
Blum, M.: Independent unbiased coin flips from a correlated biased source—a finite state Markov chain. Combinatorica 6(2), 97–108 (1986)
Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Proc. EUROCRYPT 2000, pp. 453–469 (2000)
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230–261 (1988)
Chor, B., Goldreich, O., Håstad, J., Friedman, J., Rudich, S., Smolensky, R.: The bit extraction problem of t-resilient functions. In: Proc. 26th FOCS, pp. 396–407. IEEE Computer Society Press, Los Alamitos (1985)
John, F.: Clauser and Michael A. Horne, Experimental consequences of objective local theories, Phys. Rev. D 10, 526–535 (1974)
Dodis, Y.: New Imperfect Random Source with Applications to Coin-Flipping. In: ICALP 2001, pp. 297–309 (2001)
Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved randomness extraction from two independent sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) RANDOM 2004 and APPROX 2004. LNCS, vol. 3122, Springer, Heidelberg (2004)
Dodis, Y., Oliveira, R.: On extracting private randomness over a public channel. In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol. 2764, pp. 252–263. Springer, Heidelberg (2003)
Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: Proc. FOCS 2004, pp. 196–205 (2004)
Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposure-resilient cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 301–324. Springer, Heidelberg (2001)
Dodis, Y., Spencer, J.: On the (non)Universality of the One-Time Pad. In: Proc. FOCS 2002, pp. 376–385 (2002)
Elias, P.: The efficient construction of an unbiased random sequence. Ann. Math. Stat. 43(2), 865–870 (1972)
Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In: Proc. 35th FOCS, pp. 92–101 (2003)
Lichtenstein, D., Linial, N., Saks, M.: Some extremal problems arising from discrete control processes. Combinatorica 9(3), 269–287 (1989)
Marshall, T.W., Santos, E., Selleri, F.: Local realism has not been refuted by atomic-cascade experiments. Phys. Lett. A 98, 5–9 (1983)
Massar, S.N.: locality, closing the detection loophole and communication complexity. Phys. Rev. A 65, 32121 (2002)
McInnes, J.L., Pinkas, B.: On the impossibility of private key cryptography with weakly random keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421–436. Springer, Heidelberg (1991)
Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)
Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)
Reingold, O., Vadhan, S., Wigderson, A.: A note on extracting randomness from Santha-Vazirani sources. In: Unpublished manuscript (2004)
Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci. 33(1), 75–87 (1986)
Trevisan, L., Vadhan, S.: Extracting randomness from samplable distributions. In: Proc. 41st FOCS, pp. 32–42 (2000)
Vazirani, U.V.: Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources. Combinatorica 7(4), 375–392 (1987)
Vazirani, U.V.: Efficiency considerations in using semi-random sources. In: Proc. 19th STOC, pp. 160–168 (1987)
von Neumann, J.: Various techniques used in connection with random digits. National Bureau of Standards 12, 36–38 (1951)
Vaziraniand Vijay, U.V., Vazirani, V.: Random polynomial time is equal to slightly-random polynomial time. In: Vazirani, U.V., V. Vazirani, V. (eds.) Proc. 26th FOCS, pp. 417–428 (1985)
Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16(4/5), 367–391 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dodis, Y., Renner, R. (2006). On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds) Automata, Languages and Programming. ICALP 2006. Lecture Notes in Computer Science, vol 4052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787006_18
Download citation
DOI: https://doi.org/10.1007/11787006_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35907-4
Online ISBN: 978-3-540-35908-1
eBook Packages: Computer ScienceComputer Science (R0)