It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed does not asymptotically change. However, this is not the case when we are encrypting quantum bits. For the perfect encryption of n quantum bits, 2n bits of entropy are necessary and sufficient (quantum one-time pad), but for approximate encryption one asymptotically needs only n bits of entropy. In this paper, we provide the optimal trade-off between the approximation measure ϵ and the amount of classical entropy used in the encryption of single quantum bits. Then, we consider n-qubit encryption schemes which are a composition of independent single-qubit ones and provide the optimal schemes both in the 2- and the -norm. Moreover, we provide a counterexample to show that the encryption scheme of Ambainis-Smith [Proceedings of RANDOM ’04, pp. 249–260] based on small-bias sets does not work in the -norm.

1.
Alon
,
N.
,
Goldreich
,
O.
,
Hastad
,
J.
, and
Peralta
,
R.
, “
Simple construction of almost k-wise independent random variables
,”
Random Struct. Algorithms
3
(
3
),
289
304
(
1992
).
2.
Ambainis
,
A.
,
Mosca
,
M.
,
Tapp
,
A.
, and
de Wolf
,
R.
, “
Private quantum channels
,” Proceedings of FOCS’2000, pp.
547
553
.
3.
Ambainis
,
A.
, and
Smith
,
A.
, “
Small pseudo-random families of matrices: Derandomizing approximate quantum encryption
,” Proceedings of RANDOM’04, pp.
249
260
.
4.
Bouda
,
J.
, and
Ziman
,
M.
, “
Limits and restrictions of private quantum channel
,” http://arxiv.org/abs/quant-ph/0506107(
2005
).
5.
Hayden
,
P.
,
Leung
,
D.
,
Shor
,
P.
, and
Winter
,
A.
, “
Randomizing quantum states: Constructions and applications
,”
Commun. Math. Phys.
250
(
2
),
371
391
(
2004
).
6.
King
,
C.
, “
Additivity for unital qubit channels
,”
J. Math. Phys.
43
,
4641
4653
(
2002
).
7.
Naor
,
J.
, and
Naor
,
M.
, “
Small-bias probability spaces: Efficient construction and applications
,”
SIAM J. Comput.
22
(
4
),
838
856
(
1993
).
8.
Nielsen
,
M. A.
, “
Probability distributions consistent with a mixed state
,”
Phys. Rev. A
61
(
6
),
064301
(
2000
).
9.
Nielsen
,
M. A.
, and
Chuang
,
I. L.
,
Quantum Computation and Quantum Information
(
Cambridge University Press
, Cambridge,
2000
).
10.
Ruskai
,
M. B.
,
Szarek
,
S.
, and
Werner
,
E.
, “
An analysis of completely-positive trace-preserving maps on 2×2 matrices
,”
Linear Algebr. Appl.
347
,
159
187
(
2002
).
11.
Shannon
,
C. E.
, “
A mathematical theory of communication
,”
Bell Syst. Tech. J.
27
,
379
423
(
1948
);
Shannon
,
C. E.
, “
A mathematical theory of communication
,”
Bell Syst. Tech. J.
27
,
623
656
(
1948
).
12.
Shannon
,
C. E.
, “
Communication theory of secrecy systems
,”
Bell Syst. Tech. J.
28
,
656
715
(
1949
).
13.
Shor
,
P. W.
, “
Equivalence of additivity questions in quantum information theory
,” http://arxiv.org/abs/quant-ph/0305035 (
2003
).
You do not currently have access to this content.