{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:47:00Z","timestamp":1764226020020,"version":"3.40.5"},"reference-count":41,"publisher":"Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Ministry of Internal Affairs and Communications (MIC), R&D of ICT Priority Technology Project","award":["JPMI00316"],"award-info":[{"award-number":["JPMI00316"]}]},{"name":"JSPS Grant-in-Aid for Early-Career Scientists","award":["JP22K13977"],"award-info":[{"award-number":["JP22K13977"]}]}],"content-domain":{"domain":["quantum-journal.org"],"crossmark-restriction":false},"short-container-title":["Quantum"],"abstract":"<jats:p>We developed new concentration inequalities for a quantum state on an <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>N<\/mml:mi><\/mml:math>-qudit system or measurement outcomes on it that apply to an adversarial setup, where an adversary prepares the quantum state. Our one-sided concentration inequalities for a quantum state require the <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>N<\/mml:mi><\/mml:math>-qudit system to be permutation invariant and are thus de-Finetti type, but they are tighter than the one previously obtained. We show that the bound can further be tightened if each qudit system has an additional symmetry. Furthermore, our concentration inequality for the outcomes of independent and identical measurements on an <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>N<\/mml:mi><\/mml:math>-qudit quantum system has no assumption on the adversarial quantum state and is much tighter than the conventional one obtained through Azuma's inequality. We numerically demonstrate the tightness of our bounds in simple quantum information processing tasks.<\/jats:p>","DOI":"10.22331\/q-2024-11-27-1540","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T11:36:16Z","timestamp":1732707376000},"page":"1540","update-policy":"https:\/\/doi.org\/10.22331\/q-crossmark-policy-page","source":"Crossref","is-referenced-by-count":2,"title":["Tight concentration inequalities for quantum adversarial setups exploiting permutation symmetry"],"prefix":"10.22331","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4164-4307","authenticated-orcid":false,"given":"Takaya","family":"Matsuura","sequence":"first","affiliation":[{"name":"Centre for Quantum Computation & Communication Technology, School of Science, RMIT University, Melbourne VIC 3000, Australia"},{"name":"RIKEN Center for Quantum Computing (RQC), Hirosawa 2-1, Wako, Saitama 351-0198, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3245-5344","authenticated-orcid":false,"given":"Shinichiro","family":"Yamano","sequence":"additional","affiliation":[{"name":"Department of Applied Physics, Graduate School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0512-5446","authenticated-orcid":false,"given":"Yui","family":"Kuramochi","sequence":"additional","affiliation":[{"name":"Department of Physics, Faculty of Science, Kyushu University, 744 Motooka, Nishi-ku, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0745-6791","authenticated-orcid":false,"given":"Toshihiko","family":"Sasaki","sequence":"additional","affiliation":[{"name":"Department of Applied Physics, Graduate School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan"},{"name":"Photon Science Center, Graduate School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4518-1461","authenticated-orcid":false,"given":"Masato","family":"Koashi","sequence":"additional","affiliation":[{"name":"Department of Applied Physics, Graduate School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan"},{"name":"Photon Science Center, Graduate School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan"}]}],"member":"9598","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"0","doi-asserted-by":"publisher","unstructured":"Wassily Hoeffding. ``Probability Inequalities for Sums of Bounded Random Variables&apos;&apos;. Journal of the American Statistical Association 58, 13\u201330 (1963).","DOI":"10.2307\/2282952"},{"key":"1","unstructured":"Ivan N. Sanov. ``On the probability of large deviations of random magnitudes&apos;&apos;. Mat. Sb. (N.S.) 84, 11\u201344 (1957)."},{"key":"2","doi-asserted-by":"publisher","unstructured":"Imre Csiszar. ``Sanov Property, Generalized $I$-Projection and a Conditional Limit Theorem&apos;&apos;. The Annals of Probability 12, 768 \u2013 793 (1984).","DOI":"10.1214\/aop\/1176993227"},{"key":"3","doi-asserted-by":"publisher","unstructured":"Yuki Takeuchi and Tomoyuki Morimae. ``Verification of Many-Qubit States&apos;&apos;. Phys. Rev. X 8, 021060 (2018).","DOI":"10.1103\/PhysRevX.8.021060"},{"key":"4","doi-asserted-by":"publisher","unstructured":"Omar Fawzi, Richard Kueng, Damian Markham, and Aadil Oufkir. ``Learning properties of quantum states without the IID assumption&apos;&apos;. Nature Communications 15, 9677 (2024).","DOI":"10.1038\/s41467-024-53765-6"},{"key":"5","doi-asserted-by":"publisher","unstructured":"Peter W. Shor and John Preskill. ``Simple Proof of Security of the BB84 Quantum Key Distribution Protocol&apos;&apos;. Phys. Rev. Lett. 85, 441\u2013444 (2000).","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"6","doi-asserted-by":"publisher","unstructured":"Hoi-Kwong Lo and H. F. Chau. ``Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances&apos;&apos;. Science 283, 2050\u20132056 (1999).","DOI":"10.1126\/science.283.5410.2050"},{"key":"7","doi-asserted-by":"publisher","unstructured":"M Koashi. ``Simple security proof of quantum key distribution based on complementarity&apos;&apos;. New Journal of Physics 11, 045018 (2009).","DOI":"10.1088\/1367-2630\/11\/4\/045018"},{"key":"8","doi-asserted-by":"publisher","unstructured":"Takaya Matsuura. ``Digital quantum information processing with continuous-variable systems&apos;&apos;. Springer Nature. (2023).","DOI":"10.1007\/978-981-19-8288-0"},{"key":"9","doi-asserted-by":"publisher","unstructured":"Kiyoshi Tamaki, Masato Koashi, and Nobuyuki Imoto. ``Unconditionally secure key distribution based on two nonorthogonal states&apos;&apos;. Phys. Rev. Lett. 90, 167904 (2003).","DOI":"10.1103\/PhysRevLett.90.167904"},{"key":"10","doi-asserted-by":"publisher","unstructured":"J.-C. Boileau, K. Tamaki, J. Batuwantudawe, R. Laflamme, and J. M. Renes. ``Unconditional Security of a Three State Quantum Key Distribution Protocol&apos;&apos;. Phys. Rev. Lett. 94, 040503 (2005).","DOI":"10.1103\/PhysRevLett.94.040503"},{"key":"11","doi-asserted-by":"publisher","unstructured":"Maxim Raginsky and Igal Sason. ``Concentration of Measure Inequalities in Information Theory, Communications, and Coding&apos;&apos;. Foundations and Trends\u00ae in Communications and Information Theory 10, 1\u2013246 (2013).","DOI":"10.1561\/0100000064"},{"key":"12","doi-asserted-by":"publisher","unstructured":"Colin McDiarmid. ``Concentration&apos;&apos;. Pages 195\u2013248. Springer Berlin Heidelberg. Berlin, Heidelberg (1998).","DOI":"10.1007\/978-3-662-12788-9_6"},{"key":"13","unstructured":"Go Kato. ``Concentration inequality using unconfirmed knowledge&apos;&apos; (2020). arXiv:2002.04357."},{"key":"14","doi-asserted-by":"publisher","unstructured":"RENATO RENNER. ``SECURITY OF QUANTUM KEY DISTRIBUTION&apos;&apos;. International Journal of Quantum Information 06, 1\u2013127 (2008).","DOI":"10.1142\/S0219749908003256"},{"key":"15","doi-asserted-by":"publisher","unstructured":"Carlton M. Caves, Christopher A. Fuchs, and R\u00fcdiger Schack. ``Unknown quantum states: The quantum de Finetti representation&apos;&apos;. Journal of Mathematical Physics 43, 4537\u20134559 (2002).","DOI":"10.1063\/1.1494475"},{"key":"16","doi-asserted-by":"publisher","unstructured":"Robert K\u00f6nig and Renato Renner. ``A de Finetti representation for finite symmetric quantum states&apos;&apos;. Journal of Mathematical Physics 46, 122108 (2005).","DOI":"10.1063\/1.2146188"},{"key":"17","doi-asserted-by":"publisher","unstructured":"Matthias Christandl, Robert K\u00f6nig, Graeme Mitchison, and Renato Renner. ``One-and-a-Half Quantum de Finetti Theorems&apos;&apos;. Communications in Mathematical Physics 273, 473\u2013498 (2007).","DOI":"10.1007\/s00220-007-0189-3"},{"key":"18","doi-asserted-by":"publisher","unstructured":"Renato Renner. ``Symmetry of large physical systems implies independence of subsystems&apos;&apos;. Nature Physics 3, 645\u2013649 (2007).","DOI":"10.1038\/nphys684"},{"key":"19","doi-asserted-by":"publisher","unstructured":"Matthias Christandl, Robert K\u00f6nig, and Renato Renner. ``Postselection Technique for Quantum Channels with Applications to Quantum Cryptography&apos;&apos;. Phys. Rev. Lett. 102, 020504 (2009).","DOI":"10.1103\/PhysRevLett.102.020504"},{"key":"20","doi-asserted-by":"publisher","unstructured":"Omar Fawzi and Renato Renner. ``Quantum Conditional Mutual Information and Approximate Markov Chains&apos;&apos;. Communications in Mathematical Physics 340, 575\u2013611 (2015).","DOI":"10.1007\/s00220-015-2466-x"},{"key":"21","doi-asserted-by":"publisher","unstructured":"Fr\u00e9d\u00e9ric Dupuis, Omar Fawzi, and Renato Renner. ``Entropy Accumulation&apos;&apos;. Communications in Mathematical Physics 379, 867\u2013913 (2020).","DOI":"10.1007\/s00220-020-03839-5"},{"key":"22","doi-asserted-by":"publisher","unstructured":"Tony Metger, Omar Fawzi, David Sutter, and Renato Renner. ``Generalised entropy accumulation&apos;&apos;. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS). Pages 844\u2013850. (2022).","DOI":"10.1109\/FOCS54457.2022.00085"},{"key":"23","doi-asserted-by":"publisher","unstructured":"Tony Metger and Renato Renner. ``Security of quantum key distribution from generalised entropy accumulation&apos;&apos;. Nature Communications 14, 5272 (2023).","DOI":"10.1038\/s41467-023-40920-8"},{"key":"24","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier and Nicolas J. Cerf. ``Quantum de finetti theorem in phase-space representation&apos;&apos;. Phys. Rev. A 80, 010102 (2009).","DOI":"10.1103\/PhysRevA.80.010102"},{"key":"25","doi-asserted-by":"publisher","unstructured":"Anthony Leverrier. ``$SU(p,q)$ coherent states and a Gaussian de Finetti theorem&apos;&apos;. Journal of Mathematical Physics 59, 042202 (2018).","DOI":"10.1063\/1.5007334"},{"key":"26","doi-asserted-by":"publisher","unstructured":"David Gross, Sepehr Nezami, and Michael Walter. ``Schur\u2013Weyl Duality for the Clifford Group with Applications: Property Testing, a Robust Hudson Theorem, and de Finetti Representations&apos;&apos;. Communications in Mathematical Physics 385, 1325\u20131393 (2021).","DOI":"10.1007\/s00220-021-04118-7"},{"key":"27","doi-asserted-by":"publisher","unstructured":"Kazuoki Azuma. ``Weighted sums of certain dependent random variables&apos;&apos;. Tohoku Mathematical Journal 19, 357 \u2013 367 (1967).","DOI":"10.2748\/tmj\/1178243286"},{"key":"28","doi-asserted-by":"publisher","unstructured":"William Fulton and Joe Harris. ``Representation Theory: A First Course&apos;&apos;. Graduate texts in mathematics. Springer. (1991).","DOI":"10.1007\/978-1-4612-0979-9"},{"key":"29","doi-asserted-by":"publisher","unstructured":"William Fulton. ``Young Tableaux: With Applications to Representation Theory and Geometry&apos;&apos;. London Mathematical Society Student Texts. Cambridge University Press. (1996).","DOI":"10.1017\/CBO9780511626241"},{"key":"30","doi-asserted-by":"publisher","unstructured":"Masahito Hayashi. ``Group Representation for Quantum Theory&apos;&apos;. Springer Cham. (2017).","DOI":"10.1007\/978-3-319-44906-7"},{"key":"31","doi-asserted-by":"publisher","unstructured":"Thomas M. Cover and Joy A. Thomas. ``Elements of Information Theory 2nd Edition (Wiley Series in Telecommunications and Signal Processing)&apos;&apos;. Wiley-Interscience. USA (2006).","DOI":"10.1002\/047174882X"},{"key":"32","unstructured":"Joseph L. Doob. ``Stochastic Processes&apos;&apos;. John Wiley & Sons. USA (1953). url: https:\/\/www.wiley.com\/en-us\/Stochastic+Processes-p-9780471523697."},{"key":"33","doi-asserted-by":"publisher","unstructured":"Takaya Matsuura, Shinichiro Yamano, Yui Kuramochi, Toshihiko Sasaki, and Masato Koashi. ``Refined finite-size analysis of binary-modulation continuous-variable quantum key distribution&apos;&apos;. Quantum 7, 1095 (2023).","DOI":"10.22331\/q-2023-08-29-1095"},{"key":"34","doi-asserted-by":"publisher","unstructured":"Guillermo Curr\u00e1s-Lorenzo, \u00c1lvaro Navarrete, Koji Azuma, Go Kato, Marcos Curty, and Mohsen Razavi. ``Tight finite-key security for twin-field quantum key distribution&apos;&apos;. npj Quantum Information 7, 22 (2021).","DOI":"10.1038\/s41534-020-00345-3"},{"key":"35","doi-asserted-by":"publisher","unstructured":"Charles H. Bennett and Gilles Brassard. ``Quantum cryptography: Public key distribution and coin tossing&apos;&apos;. Theoretical Computer Science 560, 7\u201311 (2014).","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"36","doi-asserted-by":"publisher","unstructured":"Marco Tomamichel, Charles Ci Wen Lim, Nicolas Gisin, and Renato Renner. ``Tight finite-key analysis for quantum cryptography&apos;&apos;. Nature Communications 3, 634 (2012).","DOI":"10.1038\/ncomms1631"},{"key":"37","doi-asserted-by":"publisher","unstructured":"Masahito Hayashi and Toyohiro Tsurumaru. ``Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths&apos;&apos;. New Journal of Physics 14, 093014 (2012).","DOI":"10.1088\/1367-2630\/14\/9\/093014"},{"key":"38","doi-asserted-by":"publisher","unstructured":"Charles Ci Wen Lim, Marcos Curty, Nino Walenta, Feihu Xu, and Hugo Zbinden. ``Concise security bounds for practical decoy-state quantum key distribution&apos;&apos;. Phys. Rev. A 89, 022307 (2014).","DOI":"10.1103\/PhysRevA.89.022307"},{"key":"39","doi-asserted-by":"publisher","unstructured":"Stephen M. Barnett Simon J. D. Phoenix and Anthony Chefles. ``Three-state quantum cryptography&apos;&apos;. Journal of Modern Optics 47, 507\u2013516 (2000).","DOI":"10.1080\/09500340008244056"},{"key":"40","doi-asserted-by":"publisher","unstructured":"Akihiro Mizutani, Yuki Takeuchi, and Kiyoshi Tamaki. ``Finite-key security analysis of differential-phase-shift quantum key distribution&apos;&apos;. Phys. Rev. Res. 5, 023132 (2023).","DOI":"10.1103\/PhysRevResearch.5.023132"}],"container-title":["Quantum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/quantum-journal.org\/papers\/q-2024-11-27-1540\/pdf\/","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T11:37:05Z","timestamp":1732707425000},"score":1,"resource":{"primary":{"URL":"https:\/\/quantum-journal.org\/papers\/q-2024-11-27-1540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":41,"URL":"https:\/\/doi.org\/10.22331\/q-2024-11-27-1540","archive":["CLOCKSS"],"relation":{},"ISSN":["2521-327X"],"issn-type":[{"type":"electronic","value":"2521-327X"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"article-number":"1540"}}