Theoretical Study of Continuous-Variable Quantum Key Distribution Anthony Leverrier

Total Page:16

File Type:pdf, Size:1020Kb

Theoretical Study of Continuous-Variable Quantum Key Distribution Anthony Leverrier Theoretical study of continuous-variable quantum key distribution Anthony Leverrier To cite this version: Anthony Leverrier. Theoretical study of continuous-variable quantum key distribution. Atomic Physics [physics.atom-ph]. Télécom ParisTech, 2009. English. tel-00451021 HAL Id: tel-00451021 https://pastel.archives-ouvertes.fr/tel-00451021 Submitted on 28 Jan 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. École Doctorale d’Informatique, Télécommunications et Électronique de Paris Thèse présentée pour obtenir le grade de docteur de l’Ecole Nationale Supérieure des Télécommunications Spécialité : Informatique et Réseaux Anthony LEVERRIER Etude théorique de la distribution quantique de clés à variables continues. Soutenue le 20 novembre 2009 devant le jury composé de Pr. Joseph Boutros Examinateur Pr. Nicolas Cerf Examinateur Pr. Jean Dalibard Examinateur Pr. Philippe Grangier Directeur de thèse Pr. Renato Renner Rapporteur Pr. Jean-Pierre Tillich Rapporteur Pr. Gilles Zémor Directeur de thèse École Doctorale d’Informatique, Télécommunications et Électronique de Paris PhD THESIS prepared and presented at Graduate School of Telecom ParisTech A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF SCIENCE Specialized in Network and Computer Science Anthony LEVERRIER Theoretical study of continuous-variable quantum key distribution. Prof. Joseph Boutros Examiner Prof. Nicolas Cerf Examiner Prof. Jean Dalibard Examiner Prof. Philippe Grangier Advisor Prof. Renato Renner Reviewer Prof. Jean-Pierre Tillich Reviewer Prof. Gilles Zémor Advisor i A ma famille. ii Abstract This thesis is concerned with quantum key distribution (QKD), a cryptographic prim- itive allowing two distant parties, Alice and Bob, to establish a secret key, in spite of the presence of a potential eavesdropper, Eve. Here, we focus on continuous-variable protocols, for which the information is coded in phase-space. The main advantage of these protocols is that their implementation only requires standard telecom components. The security of QKD lies on the laws of quantum physics: an eavesdropper will necessary induce some noise on the communication, therefore revealing her presence. A particularly difficult step of continuous-variable QKD protocols is the “reconcilia- tion” where Alice and Bob use their classical measurement results to agree on a common bit string. We first develop an optimal reconciliation algorithm for the initial protocol, then introduce a new protocol for which the reconciliation problem is automatically taken care of thanks to a discrete modulation. Proving the security of continuous-variable QKD protocols is a challenging problem because these protocols are formally described in an infinite dimensional Hilbert space. A solution is to use all available symmetries of the protocols. In particular, we introduce and study a class of symmetries in phase space, which is particularly relevant for continuous- variable QKD. Finally, we consider finite size effects for these protocols. We especially analyse the influence of parameter estimation on the performance of continuous-variable QDK protocols. Keywords: quantum cryptography, quantum key distribution, quantum optics, quan- tum communication, quantum bit commitment, phase-space representation, information theory, quantum information theory error correcting code. iii Résumé Cette thèse porte sur la distribution quantique de clés, qui est une primitive cryp- tographique qui permet à deux correspondants éloignés, Alice et Bob, d’établir une clé se- crète commune malgré la présence potentielle d’un espion. On s’intéresse notamment aux protocoles “à variables continues” où Alice et Bob encodent l’information dans l’espace des phases. L’intérêt majeur de ces protocoles est qu’ils sont faciles à mettre en œuvre car ils ne requièrent que des composants télécom standards. La sécurité de ces protocoles repose sur les lois de la physique quantique : acquérir de l’information sur les données échangées par Alice et Bob induit nécessairement un bruit qui révèle la présence de l’espion. Une étape particulièrement délicate pour les protocoles à variables continues est la “réconciliation” durant laquelle Alice et Bob utilisent leurs résultats de mesure classiques pour se mettre d’accord sur une chaîne de bits identiques. Nous proposons d’abord un algorithme de réconciliation optimal pour le protocole initial, puis introduisons un nouveau protocole qui résout automatiquement le problème de la réconciliation grâce à l’emploi d’une modulation discrète. Parce que les protocoles à variables continues sont formellement décrits dans un espace de Hilbert de dimension infinie, prouver leur sécurité pose des problèmes ma- thématiques originaux. Nous nous intéressons d’abord à des symétries spécifiques de ces protocoles dans l’espace des phases. Ces symétries permettent de simplifier considérable- ment l’analyse de sécurité. Enfin, nous étudions l’influence des effets de tailles finies, tels que l’estimation du canal quantique, sur les performances des protocoles. Mots-clés : cryptographie quantique, distribution quantique de clés, optique quan- tique, communications quantiques, mise en gage quantique, représentation dans l’espace des phases, théorie de l’information, théorie de l’information quantique, code correcteur d’erreurs. iv Contents Abstract i Résumé iii Remerciements ix List of Publications xii Résumé en français xv Introduction xxxv I From Quantum information to Quantum Key Distribution 1 1 Quantum information and communication 3 1.1 A rapid presentation of Quantum Mechanics . 3 1.1.1 Description of a quantum physical system. 4 1.1.2 Evolution of a physical system . 6 1.2 Information theory: the classical picture . 9 1.2.1 Shannon entropy . 10 1.2.2 Generalization of the Shannon entropy . 11 1.2.3 Operational interpretation: Shannon’s noisy-channel theorem . 12 1.3 Information theory in the quantum age . 17 1.3.1 Encoding quantum information . 17 1.3.2 Communication over a quantum channel . 23 1.3.3 Operational entropic quantities for quantum protocols . 23 v vi CONTENTS 2 Quantum information with continuous variables 27 2.1 Phase space representation . 27 2.1.1 Canonical quantization . 27 2.1.2 Measurements in phase space . 33 2.1.3 Wigner function . 34 2.2 Gaussian states and Gaussian operations . 36 2.2.1 Gaussian states . 36 2.2.2 Gaussian operations . 41 2.2.3 Partial measurements . 44 2.3 Quantum information with continuous variables . 44 2.3.1 von Neumann entropy . 44 2.3.2 Entropy of Gaussian states . 45 2.3.3 Extremality of Gaussian states . 46 2.3.4 Possible tasks and no-go theorems for Gaussian states with Gaus- sian operations . 47 2.3.5 Gaussian states: Hilbert space versus phase space representation . 48 3 Quantum Key Distribution 49 3.1 Quantum Key Distribution . 50 3.1.1 Security of a key . 50 3.1.2 QKD protocols . 51 3.2 Security analysis of QKD . 54 3.3 Continuous-variable QKD . 56 3.3.1 General presentation of continuous-variable protocols . 57 3.3.2 A brief history of CV QKD protocols: from EPR states to coherent states . 58 3.3.3 The GG02 protocol . 59 3.3.4 Security of CV QKD . 61 3.3.5 Estimation of the covariance matrix in the entanglement-based pro- tocol from data observed in the Prepare and Measure protocol . 64 3.3.6 Paranoid versus realistic mode . 67 II Increase the range of continuous-variable QKD 73 4 Reconciliation of correlated Gaussian random variables 75 4.1 Figures of merit for a QKD system. 76 4.2 The reconciliation problem for continuous-variable QKD . 79 4.3 Reconciliation and security . 81 4.4 Reconciliation of binary variables . 83 4.5 Reconciliation of Gaussian variables . 84 4.5.1 Gaussian modulation . 84 4.5.2 Rotations on 1, 3 and 7 ...................... 87 S S S 4.6 Application of the multi-dimensional reconciliation scheme to CVQKD . 88 CONTENTS vii 4.7 Conclusion and open questions . 90 5 Long distance CVQKD: protocols with a discrete modulation 93 5.1 Longer distances mean lower SNR . 94 5.2 Reconciliation at very low SNR . 96 5.3 Presentation of the new discrete-modulation protocols . 102 5.3.1 CV QKD protocols with a discrete modulation . 102 5.3.2 General outline of security proofs against collective attacks . 104 5.4 Security of the two-state protocol . 105 5.5 Security of the four-state protocol . 108 5.6 Performances of the protocols . 111 5.7 Remaining issues . 114 5.7.1 Potential issue with reverse reconciliation . 114 5.7.2 Other potential issues for long distance CV QKD . 115 5.8 Perspectives: convergence between DV and CV QKD at long distance . 117 III Security of continuous-variable quantum cryptography 119 6 Are collective attacks optimal? 121 6.1 Strategy for a proof . 122 6.1.1 Collective versus general attacks . 122 6.1.2 Symmetrization . 124 6.1.3 Symmetric states versus i.i.d. states . 126 6.2 Symmetries in phase space . 129 6.2.1 A symmetry group in phase space . 130 6.2.2 Single-party case: main properties of orthogonal invariance in phase space . 131 6.2.3 Bipartite case: application to continuous-variable QKD . 132 6.3 de Finetti theorem and postselection procedure in phase space . 134 6.3.1 de Finetti theorem in phase space representation . 135 6.3.2 Postselection technique in phase space . 139 6.4 Possible approaches to prove the unconditional security of CVQKD . 141 6.4.1 Characterization of isotropic states in phase space . 141 6.4.2 Further than symmetrization and postselection .
Recommended publications
  • Exploiting Prior Knowledge During Automatic Key and Chord Estimation from Musical Audio
    Exploitatie van voorkennis bij het automatisch afleiden van toonaarden en akkoorden uit muzikale audio Exploiting Prior Knowledge during Automatic Key and Chord Estimation from Musical Audio Johan Pauwels Promotoren: prof. dr. ir. J.-P. Martens, prof. dr. M. Leman Proefschrift ingediend tot het behalen van de graad van Doctor in de Ingenieurswetenschappen Vakgroep Elektronica en Informatiesystemen Voorzitter: prof. dr. ir. R. Van de Walle Faculteit Ingenieurswetenschappen en Architectuur Academiejaar 2015 - 2016 ISBN 978-90-8578-883-6 NUR 962, 965 Wettelijk depot: D/2016/10.500/15 Abstract Chords and keys are two ways of describing music. They are exemplary of a general class of symbolic notations that musicians use to exchange in- formation about a music piece. This information can range from simple tempo indications such as “allegro” to precise instructions for a performer of the music. Concretely, both keys and chords are timed labels that de- scribe the harmony during certain time intervals, where harmony refers to the way music notes sound together. Chords describe the local harmony, whereas keys offer a more global overview and consequently cover a se- quence of multiple chords. Common to all music notations is that certain characteristics of the mu- sic are described while others are ignored. The adopted level of detail de- pends on the purpose of the intended information exchange. A simple de- scription such as “menuet”, for example, only serves to roughly describe the character of a music piece. Sheet music on the other hand contains precise information about the pitch, discretised information pertaining to timing and limited information about the timbre.
    [Show full text]
  • Circle of Fifths Guitar Scales
    Circle of fifths guitar scales Continue We used to talk about a large scale. We have built a large scale C, which happens to contain no sharp and non-flats. We then created some other large scales based on the same exact scale formula; that is, with the same exact type of steps as major C, but starting with a different note other than C. C Main Scale C♯ D D♯ E F♯ G♯ A♯ B C Let's take the fifth note in C-scale (tone G) and use this note to make a new scale. What will be the names of the notes? From G we will apply the formula of whole and half steps, using chromatic scales as our source: wh, wh, h, wh, wh, h. the result is G A B B C D F F♯ F. G. G. G. Major Scale G♯ A♯ B C C C♯ D♯ E F F♯ G When writing notation, we will always write sharp when F appear? It seems annoying. Therefore, the standard practice is to announce it at the beginning of a piece of music called key signatureA markings used at the beginning of a piece of written music to specify the key; usually, which notes will be sharp or which notes will be flat. (But not both) (pictured). This symbol indicates that until otherwise stated, all F will actually be F♯. Note that the sharp one is placed directly above the triple key line of note F. This key signature will be a G major key. While useful in understanding notation, key signatures are also valuable, even if we never read music.
    [Show full text]
  • 25‹ Mhz Clock Continuous-Variable Quantum Key Distribution
    www.nature.com/scientificreports OPEN 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel Received: 10 February 2015 1 1 1 1 2 1,2 Accepted: 24 August 2015 Chao Wang , Duan Huang , Peng Huang , Dakai Lin , Jinye Peng & Guihua Zeng Published: 30 September 2015 In this paper, a practical continuous-variable quantum key distribution system is developed and it runs in the real-world conditions with 25 MHz clock rate. To reach high-rate, we have employed a homodyne detector with maximal bandwidth to 300 MHz and an optimal high-efficiency error reconciliation algorithm with processing speed up to 25 Mbps. To optimize the stability of the system, several key techniques are developed, which include a novel phase compensation algorithm, a polarization feedback algorithm, and related stability method on the modulators. Practically, our system is tested for more than 12 hours with a final secret key rate of 52 kbps over 50 km transmission distance, which is the highest rate so far in such distance. Our system may pave the road for practical broadband secure quantum communication with continuous variables in the commercial conditions. Quantum key distribution (QKD) is able to enable two remote participants to share unconditionally secure keys based on the laws of quantum mechanics1–3. By combining with one-time pad encryption, the QKD is promising for effectively ending the cat and mouse game between the guardians of secrets and their enemies4 and it has now become one of the most dynamic research fields. Since the first experi- mental demonstration of the QKD over 32-cm free-space channel in 19925, tremendous efforts have been made to keep pace with the demands in large-scale and broadband secure quantum communication6–11.
    [Show full text]
  • Tonality Estimation in Electronic Dance Music a Computational and Musically Informed Examination
    Tonality Estimation in Electronic Dance Music A Computational and Musically Informed Examination Ángel Faraldo Pérez TESI DOCTORAL UPF / 2017 Thesis Directors: Dr. Sergi Jordà Puig Music Technology Group Department of Information and Communication Technologies Universitat Pompeu Fabra, Barcelona, Spain Dissertation submitted to the Department of Information and Communication Tech- nologies of Universitat Pompeu Fabra in partial fulfilment of the requirements for the degree of DOCTOR PER LA UNIVERSITAT POMPEU FABRA Copyright c 2017 by Ángel Faraldo Licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 Music Technology Group (http://mtg.upf.edu), Department of Information and Communication Tech- nologies (http://www.upf.edu/dtic), Universitat Pompeu Fabra (http://www.upf.edu), Barcelona, Spain. The doctoral defence was held on ......................... at the Universitat Pompeu Fabra and scored as ........................................................... Dr. Sergi Jordà Puig (Thesis Supervisor) Universitat Pompeu Fabra (UPF), Barcelona, Spain Dr. Agustín Martorell Domínguez (Thesis Committee Member) Universitat Pompeu Fabra (UPF), Barcelona, Spain Dr. Gianni Ginesi (Thesis Committee Member) Escola Superior de Musica de Catalunya (ESMUC), Barcelona, Spain Dr. Anja Volk (Thesis Committee Member) Universiteit Utrecht, The Netherlands This thesis has been carried out at the Music Technology Group (MTG) of Universitat Pompeu Fabra in Barcelona, Spain, from January 2014 to November 2017, supervised by Dr. Sergi Jordà Puig and Prof. Perfecto Herrera Boyer. My work has been supported by the Department of Information and Communication Technologies (DTIC) PhD fellowship (2015-17), Universitat Pompeu Fabra, and the European Research Council under the European Union’s 7th Framework Program, as part of the GiantSteps project (FP7-ICT-2013-10, grant agreement 610591).
    [Show full text]
  • AN EXPLORATION of the KEY CHARACTERISTICS in BEETHOVEN's PIANO SONATAS and SELECTED INSTRUMENTAL REPERTOIRE Dimitri Papadimit
    AN EXPLORATION OF THE KEY CHARACTERISTICS IN BEETHOVEN’S PIANO SONATAS AND SELECTED INSTRUMENTAL REPERTOIRE Dimitri Papadimitriou Dissertation submitted to Dublin City University in partial fulfilment of the requirements for the degree Doctor of Music Performance ROYAL IRISH ACADEMY OF MUSIC Supervisor: Dr. Denise Neary July 2013 Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Doctor of Music Performance, is entirely my own work, and that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge breach any law of copyright, and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed:_____________________________ ID No.:_____________ Date: _______________ Terms and Conditions of Use of Digitised Theses from Royal Irish Academy of Music Copyright statement All material supplied by Royal Irish Academy of Music Library is protected by copyright (under the Copyright and Related Rights Act, 2000 as amended) and other relevant Intellectual Property Rights. By accessing and using a Digitised Thesis from Royal Irish Academy of Music you acknowledge that all Intellectual Property Rights in any Works supplied are the sole and exclusive property of the copyright and/or other Intellectual Property Right holder. Specific copyright holders may not be explicitly identified. Use of materials from other sources within a thesis
    [Show full text]
  • Beethoven's Compositional Approach to Multi-Movement Structures in His
    Beethoven’s Compositional Approach to Multi-Movement Structures in his Instrumental Works A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2013 ERICA BUURMAN SCHOOL OF ARTS, LANGUAGES AND CULTURES Contents List of Tables................................................................................................................ 6 List of Music Examples ............................................................................................... 7 Abstract ...................................................................................................................... 11 Declaration ................................................................................................................. 12 Copyright Statement .................................................................................................. 13 Acknowledgements .................................................................................................... 14 Abbreviations ............................................................................................................. 15 Note on the Transcriptions ......................................................................................... 17 Chapter 1—Introduction ............................................................................................ 18 1.1—Aims .............................................................................................................. 18 1.2—Contexts .......................................................................................................
    [Show full text]
  • Pro Series Technical Information
    Terminology When making a definition of a term, the following rules were A definition must meet the following rules: applied to the term: 1. It must describe the subject of the term 1. Is the term listed in a standard dictionary? without graphics. 2. Is the definition there the same meaning used in 2. It must describe ONLY the subject of the term. our industry? 3. The term should not be used in the definition. A standard pocket dictionary can be obtained easily and If you have a technical objection to any definition, on short notice from a variety of stores that have a please bring it to the attention of a member of the LIST pocket book display. If the answer to either of the Council for review. questions above is no, then the definition of the term may be found here. Used by permission. Copyright © 1989, 1990, 1995, 1996, 1997 LIST Council -A- bottom pin n. usually a cylindrical shaped tumbler actual key section n. the exact cross sectional binary cut key n. a key whose combination only which may be conical, ball shaped or chisel pointed configuration of a key blade as viewed from the bow allows for two possibilities in each bitting position: on the end which makes contact with the key toward the tip cut/no cut bow n. the portion of the key which serves as a grip actuator n. a device, usually connected to a cylinder, binary type cylinder or lock n. a cylinder or lock or handle which, when activated, may cause a lock mechanism whose combination only allows for two bitting to operate possibilities in each bitting position bow stop n.
    [Show full text]
  • The Instarmental Variation Sets of Antonio Vivaldi: Old Forms in New Genres
    The Instarmental Variation Sets of Antonio Vivaldi: Old Forms in New Genres Nicholas Scott Lockey B,M., Pacitic Lutheran University, 2002 A Thesis Submitted in Partial Fulfilherit of the Requirements for the Degree of MASTER OF ARTS in the School of Music O Nicholas Scott Lockey, 2004 University of Victoria All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. Sup-r: Dr. Susan Lewis Haanmond (School of Music) Abstract Studies of variation form generally overlook the works of Antonio Vivaldi due to the lack of sufficient bibliographic resources and assumptions downplaying the significance of Vivaldi's variation sets. This study, however, argues that Vivaldi's sets represent innovative contributions to the hm It begins by cataloguing the twenty instrumental variation sets published in the &st critical edition of Vivaidits works (Milan: Ricordi, 1947-72). It then examines the sequence of vatiations and manner of conclusion in each set, issues crucial to the reception of variation form ever since late eighteenth-century writers such as Koch and Vogler expanded discussions of variation technique to address variation sets as a musical farm. Vivakli's examples are compared to those by Corelli, Rarneau, and Handel, highlighting Vivaldi's greater emphasis on coherent progressions and f'lrm conclusions. Additionally, reeent chronological studies are combined to propose that Vivaldi was among the first composers to use variation form hsolo concertos. Contents
    [Show full text]
  • Minnis, Timothy John All Rights Reserved the ORIGINAL SOLO PIANO MUSIC of ALBERT ROUSSEL
    INFORMATION TO USERS This reproduction was made from a copy of a document sent to us for microfilming. While the most advanced technology has been used to photograph and reproduce this document, the quality of the reproduction is heavily dependent upon the quality of the material submitted. The following explanation of techniques is provided to help clarify markings or notations which may appear on this reproduction. 1.The sign or “target” for pages apparently lacking from the document photographed is “Missing Page(s)”. If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting through an image and duplicating adjacent pages to assure complete continuity. 2. When an image on the film is obliterated with a round black mark, it is an indication of either blurred copy because of movement during exposure, duplicate copy, or copyrighted materials that should not have been filmed. For blurred pages, a good image of the page can be found in the adjacent frame. If copyrighted materials were deleted, a target note will appear listing the pages in the adjacent frame. 3. When a map, drawing or chart, etc., is part of the material being photographed, a definite method of “sectioning” the material has been followed. It is customary to begin filming at the upper left hand comer of a large sheet and to continue from left to right in equal sections with small overlaps. If necessary, sectioning is continued again—beginning below the first row and continuing on until complete.
    [Show full text]
  • Modal Chord Progressions
    Modal Chord Progressions: The main thing to notice with any modal chord progression is the disparity between the theoretical key that the chords have come from, diatonically speaking...and the home key or key centre that the ear hears. Take for example the following chord progression: C – G – AM7 – (D7 G) - C It is usually the case that the first chord is the Tonic chord and also the point of departure. In this case then, it appears that the C Major chord is the Tonic or Key chord. But from a theoretical point of view the C Major scale does not accommodate a D7 chord. Of course, one way to explain the presence of this chord, is that it is a secondary dominant - the idea that any chord can be preceded by its own Dominant 7th chord whose root is a perfect 5th higher). In which case, isn’t this progression just the C Major scale with a slight deviation? Well, what I would say without doubt, is that the note ‘C’ and the C Major chord are at the centre of things. The fact that we start and end on it helps in this regard. If we are looking for a unifying scale to play over the entire progression (accepting as we will that the whole progression belongs to one key – rather than a modulation) then the fact of the matter is that the notes provided by the C Major scale will NOT work: there is a clash between the natural F in the C Major scale and the F# resident in the D7 chord.
    [Show full text]
  • This Thesis Has Been Submitted in Fulfilment of the Requirements for a Postgraduate Degree (E.G
    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. ACCOUNTING AND THE STATE: TRANSPARENCY AS THE ART OF GOVERNMENT Jonathan Andrew Tweedie Doctor of Philosophy The University of Edinburgh 2020 Abstract In this thesis, I explore how accounting is used by the British state in order to govern its citizens. Specifically, I investigate the emergence of ‘the transparent state’, the state that claims to make its inner workings visible to its citizens through the publication of vast arrays of online, financial and non-financial information, audit and performance measures, ranking, ratings and statistics. The state claims that the visibility produced by ‘transparency’ is democratising and empowering for its citizens. I consider how this form of visibility compares to the ways in which the state has appeared to and/or concealed itself from its citizens throughout history.
    [Show full text]
  • Music Chord Progression Analysis
    Music Chord Progression Analysis Final Project Report for “Probability and Statistics for Data Science” (ECE 225) Hao-Wen Dong Chun-Jhen Lai [email protected] [email protected] Introduction We aim to analyze the statistical properties of chords and chord progressions in over ten thousand songs available on the HookTheory platform. 1 In particular, we are interested in analyzing the prior probabilities for different chords, the transition probabilities between chords and chords and the most frequent chord progressions. We are also interested in how these statistics differ from genre to genre with an eye to reveal some interesting trends on the usage of chords and chord progressions in different genres. Data HookTheory is a community-based platform for users to upload lead sheets (i.e., melody and chord progressions) for different songs. We use the version compiled and provided on a GitHub repository.2 This dataset contains 18986 music segments from 11380 songs of 4956 artists. Data preprocessing The data is stored in JSON format. We first extract the metadata from each song. This includes key, speed (in bpm; beats per minutes), beats per measure and genre tags. We then look into the chords used in each song. We note that there are two versions of chord annotations, which are absolute chords (i.e., the actual chords played) and relative chords (i.e., the chords relative to the key signature)3. In order to see statistics over different keys, we adopt the relative chord annotations. In this way, this is similar to transposing each song into C key and conducting analysis on a collection of songs in C key.
    [Show full text]