Quantum key distribution

Size: px
Start display at page:

Download "Quantum key distribution"

Transcription

1 Quantum key distribution Eleni Diamanti LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing doctoral school May 10,

2 Outline Principles of quantum information useful for quantum cryptography Introduction to cryptography and key distribution Quantum key distribution: general idea, BB84 protocol, QKD generic algorithm, photon number splitting attacks Continuous-variable QKD: principle and security Practical implementations, towards on-chip systems Current challenges in quantum cryptography 2

3 Principles of quantum information In quantum information, information is encoded on the qubit quantum analog to the classical bit fundamental unit of information it can be any physical system that can exist in two states ions, atoms, electrons, photons The photon is exclusively the qubit in quantum communication systems it is robust to ambient noise it can be transported for long distances in optical fibers For quantum computing systems, there are still many candidates: cold atoms, ions, superconducting circuits, photons 3

4 qubit = two-dimensional quantum system its Hilbert space is spanned by two basis states 0, 1 : computational basis All states of the qubit can be expressed in this basis as: i qubit cos 0 e sin 1 Bloch sphere representation 0 z Superposition principle: Qubits can exist in superposition states. In general, qubit where 1, i.e. the probabilities of measuring the state in the two eigenstates add up to 1 x 2 qubit y 1 4

5 A useful qubit A qubit is useful when we can prepare it in a well defined initial state for photons, we use single-photon sources or lasers, followed by appropriate operations beam splitter, phase shifter, half or quarter waveplates for different types of encoding we can manipulate it by applying well controlled unitary operations for photons, we use standard photonic components we can measure it for photons, we use single-photon detectors the result is deterministic if we know the preparation basis, otherwise the result is ambiguous the measurement projects the qubit at a definite state, we cannot re-measure it! the measurement disturbs the qubit (Heisenberg s uncertainty principle) 5

6 No-cloning theorem A quantum state cannot be copied, fundamental property, important for quantum cryptography, is impossible 6

7 Entanglement and nonlocality Information can be encoded on entangled qubits 1 entangled 2 H H V V an entangled state cannot be factorized in product states when one qubit is measured, the measurement result being completely random, the second qubit will be found in the corresponding state signature of nonlocality Non-local states produce interesting effects when we consider correlations Bell inequalities derived for local hidden variable models S The violation of Bell s inequality is a confirmation of the nonlocal nature of quantum mechanics 7

8 What about applications? The notions of superposition and entanglement are a precious resource for applications in quantum communications and quantum computing there is no classical analog to these notions, which allow us to improve drastically our communication and calculation capacity These applications include quantum teleportation, entanglement swapping, quantum repeaters quantum key distribution, quantum cryptography quantum algorithms the most advanced field in quantum communications, close to industrial applications 8

9 From ancient times cryptography = κρυπτός + γράφω = write secretly The wish to communicate secretly goes back to the beginning of our civilisation in Ancient Greece, the Spartans (~400 bc) were using the Scytale transposition = rearrangement of plaintext by special permutation Cesar introduced for the first time a simple cipher based on the substitution of letters substitution = replacement of letters by other letters 9

10 to modern times During the second World War, the famous Enigma, an extremely sophisticated device, was extensively used Enigma was broken by a British team (with Alan Turing) with the first digital computer (COLOSSUS) Today, cryptography is used everywhere for military and diplomatic purposes, but also in the Internet, online commerce, An essential different with the first encryption schemes is that the encryption and decryption algorithms are publicly known security relies solely on the secrecy of a chain of random bits, the key 10

11 The Vernam cipher or one-time pad Alphabet Example A B C D E X Y Z!, H E L L O W O R L D! M k C U M D L W Z F!! I U Algorithms E ( M ) M k(mod30) C k D ( C) C k(mod30) M k 11

12 What is wrong with classical cryptography? Vernam showed that if the key is truly random as long as the message only used once a spy cannot reconstruct the message even if she possesses infinite time and computational resources But the two parties first have to share the key using a trusted and secure channel cryptography = key distribution problem Solutions classical dedicated trusted courier : not practical mathematical public-key cryptography : computational security physical quantum cryptography : unconditional security Security relies on mathematical assumptions that have not been proven (factorization of large prime numbers) future progress can compromise the secret messages exchanged today 12

13 Quantum key distribution Quantum cryptography relies on the laws of quantum mechanics superposition principle, no-cloning theorem to resolve the problem of key distribution offering unconditional security guaranteed against a spy with infinite time and computational resources A quantum key distribution (QKD) system includes a quantum channel used for the transmission of qubits an authenticated classical channel used for testing possible perturbations in the transmission 13

14 Quantum channel error information Authenticated classical channel Eve s measurement inevitably introduces perturbations that lead to detectable errors the analysis of these errors allows the generation of the secret key During the quantum transmission, the key is obtained using either a given set of non-orthogonal quantum states of single photons or a given set of measurements performed on entangled photons 14

15 A single-photon QKD protocol (BB84) The first QKD protocol was proposed by Bennett and Brassard in 1984 (BB84) Suppose information is encoded in the polarization of single photons 1 using two non-orthogonal bases basis 45 - basis In practice, the system of Alice and Bob could be like this: Single-photon source Electrooptic modulator H V Quantum channel 50/50 beamsplitter 0 - basis Polarization beam splitters Single-photon detectors / basis 15

16 If only one basis was used Eve could insert a detection system like Bob s in the path, obtain the answer and retransmit the bit to Alice without been detected By adding a second non-orthogonal basis, whose states can be written as a linear superposition of the first basis states, e.g., H V Eve gets confused since she does not know in which basis she should measure the intercepted photons if she measures in the right basis she gets the right result if she measures in the wrong basis she gets a completely random result Trade-off between the information obtained from the measurement and the perturbation of the states due to no-cloning of non-orthogonal states 16

17 Protocol Alice sends randomly modulated single photons to Bob Bob randomly measures in one of the two bases They talk on the phone to say which basis they have used for each photon without revealing the result! They discard the instances for which they chose a different basis process of sifting : 50% probability What remains is the secret key! Example Alice codes x + x + + x x + Bob decodes x x x x Sifting Key 17

18 Eve s intercept and resend attack simple security argument Source Eve does not know the preparation basis, she has to randomly choose the measurement basis of her intercepted photons she chooses the wrong basis with 50% probability and Bob chooses the right basis with 50% probability Overall error rate = 25% if Alice and Bob sacrifice part of their key to estimate the error rate Eve s presence is inevitably detected 18

19 An entangled-photon QKD protocol (BBM92) The first QKD protocol based on entanglement was proposed by Ekert in 1991, followed by Bennett, Brassard and Mermin in 1992 extension of the BB84 protocol 0 - basis Entangled-photon source 0 - basis 45 - basis 45 - basis Information is coded on the polarization of entangled photons, in particular H V V H

20 Protocol Alice and Bob independently and randomly choose a measurement basis If their bases match, they keep the results as their key (after sifting) Alice and Bob can simply check if Bell s inequality has been violated at the end of their communication i.e., if for their polarization measurements they find S 2 2 a spy has intercepted their communication! A spy s measurements prevent the violation of Bell s inequality Eve cannot obtain information during the quantum transmission the key does not exist in the transmission channel, it is created after the measurements by Alice and Bob, and their public communication! Eve can intercept and block the entangled pair, and prepare a new pair for which she has at least partial information three partially entangled photons (monogamy of entanglement) but, as before, this will inevitably introduce errors, which would be absent in a perfect system free of spying 20

21 Is the key secret? In the absence of system errors, the spy will surely get detected by the errors she induces in the communication this procedure leads to the establishment of unconditionally secret keys But all practical systems have innocent errors! due to imperfections of the system components errors due to imperfections cannot be distinguished from errors caused by eavesdropping A complete QKD protocol should consider all errors as errors due to Eve, take into account possible information leakage, and bound this leakage as a function of the error rate this is performed by two additional processes Error correction + Privacy amplification A security proof of a QKD protocol against general eavesdropping attacks is a difficult theoretical exercise Hierarchy of attacks: individual collective coherent (unconditional security) 21

22 A QKD algorithm Quantum transmission Raw key Sifted key Error-free key Sifting Error correction Error rate estimation Leakage due to error correction Source characteristics Security criteria Theory Privacy amplification Shrinking factor Secret key 22

23 Secret key generation rate in practical systems We examine the case of BB84 with polarization encoding key generation rate after quantum transmission Rraw = ν μt + d where communication rate average number of photons per pulse T ( L L )/10 10 B transmission efficiency detector quantum efficiency L L B channel loss coefficient channel length receiver's losses d detector dark counts per clock cycle final secret key generation rate Privacy amplification Error correction Rsecret = 1 2 ν(µt + d τ f e h(e 23

24 Typical curve of rate vs. distance Linear part the rate drops as a given power of the channel attenuation Exponential part the rate drops abruptly and goes to zero due to the growing contribution of the detector dark counts 24

25 BB84 and photon number splitting (PNS) attacks Consider the practical case of using a highly attenuated laser instead of a single-photon source the laser is a photon source that follows the Poisson distribution, i.e., n e Pn ( ) where is the average photon number per pulse n! Eve can perform the following attack non-destructive measurement of photon number if n 2 : extract and keep one photon, perform delayed measurement if not : block the signal and pretend a vacuum state Photon number measurement Perfect channel Quantum memory Delayed measurement 25

26 Why is this detrimental? If the channel loss is large, the photon arrival rate at Bob s site is much lower than the photon sending rate at Alice s site Eve can replace the lossy fiber with a lossless one, block one-photon pulses completely, and, if she finds more than one photon, extract one and keep it until Alice and Bob have revealed their bases If the transmitted photons are enough to simulate the average photon arrival rate determined by the channel loss, Eve can extract complete information about the key without inducing any error the entire key is completely insecure! For an ideal single-photon source: R ideal ~T i.e., the rate decreases linearly with the channel transmission For an attenuated laser source: R laser ~T 2, μopt ~T i.e., the rate decreases quadratically with the channel transmission 26

27 Practical components create security loopholes in QKD systems Eliminating these loopholes while obtaining good performance is a major challenge in the field 27

28 Continuous-variable QKD Up till now we have described QKD relying on discrete variables: key information encoded on properties (polarization, phase) of single photons (or weak coherent states) Key information can also be encoded on continuous variables Random modulation of amplitude and phase of coherent states Random measurement of quadrature of each coherent state with a homodyne detection system Gaussian modulation ( V A ) Random quadrature measurement v, el P Shot noise A T, quantum channel classical channel Signal Phase modulator choice of X or P Local oscillator _ 28 28

29 Security of coherent state CV-QKD Shot noise In the Gaussian channel model, coherent states are modified by losses and excess noise Excess noise These are introduced by Eve and degrade the signal-tonoise ratio (SNR) her presence is revealed by noise variance measurements Statistics from the homodyne detection allow to quantify the noise introduced by the eavesdropper Shannon s theory links the information exchanged between Alice and Bob, and the SNR I 1 log 1 SNR 1 TV log 1 A T AB

30 Security of coherent state CV-QKD Eve s information on Bob s key (reverse reconciliation) is bounded using a Heisenberg inequality (uncertainty on Eve s knowledge of Bob s measurements) I 1 log 2 BE 2 TV A 1 T T / 1 T T 1 VA 1 Secret key generation rate K IAB IBE 0, for any transmission T 30

31 Secret key generation rate K Result applies to individual, Gaussian attacks Security proven against arbitrary collective attacks : Gaussian attacks are optimal More recently, security proofs against arbitrary coherent attacks at asymptotic limit and in finite-size regime: in practical implementations, finite size of data must be taken into account! 31

32 Post-processing algorithms After the quantum transmission, Alice and Bob share a set of correlated quadrature measurements To distill a secret string of bits, they need to: Discretize their data to obtain discrete symbols correct the errors reconciliation eliminate any remaining key information available to Eve privacy amplification Error correction performed using multi-dimensional reconciliation and Low Density Parity Check (LDPC) codes with finite efficiency I rec K I rec I AB I BE K 32

33 Effective secret key generation rate In practice, reconciliation limits the communication distance K IAB IBE 0, for small transmission K K eff 33

34 Discrete and continuous-variable QKD Discrete variables Continuous variables Key encoding Photon polarization/phase EM field amplitude-phase Detection Single-photon Coherent (homodyne/heterodyne) Max range 200 km 100 km Max rate 1 Mbit/s 100 kbit/s Post processing Key readily available Complex error correction Security General attacks, finite-size, side channels General attacks, finite-size, side channels Stability Months Months 34

35 Practical implementations Goal: best performance in terms of maximum communication rate and distance with a high guaranteed security level The choice of communication channel is crucial free space direct link between Alice and Bob using telescopes no birefringence but atmospheric perturbations and background noise optical fiber minimum absorption at 1550 nm (0,2 db/km) telecom wavelength very easy to use but birefringence and polarization fluctuations This choice determines the operation wavelength of the system components, and especially the sources and detectors 35

36 The first QKD system IBM-University of Montréal 36

37 QKD prototypes ID Quantique University of Vienna Institut d Optique, TélécomParisTech 37

38 Optical setup for coherent state CV-QKD Alice Feedback control 1 s (1 MHz) 100 ns Laser diode 1550 nm 1/99 Variable Photodiode Signal attenuator Amplitude Phase Modulator Modulator Local oscillator 50/50 Faraday mirror 20 m Polarization beam splitter PBS Homodyne detector _ S Clock generation Bob Channel 50/50 LO Phase Modulator PBS PBS 20 m Polarization controller 10/90 LO S 200 ns Faraday mirror 38

39 Long-distance experiments Bottleneck due to inefficient error correction for Gaussian variables New error correction codes at low SNR Improved optical stability to enable the acquisition of large blocks - 10 kbit/s@ 20 km, km - Secure against collective attacks including finite-size effects Finite-size 10 8 Finite-size 10 9 Asymptotic 39

40 Practical QKD networks Up till now individual point-to-point links between Alice and Bob But their range is inherently limited for next generation of very long-distance cryptographic systems we need secure quantum networks SECOQC QKD network, 2008 Various QKD prototypes on Siemens optical fiber network in Vienna Target performance: 2 kbit/s, 25 km, 24 hour operation Several network quality tests Tokyo QKD network, 2010, 2015 Durban South Africa network, 2010 Swiss Quantum Network,

41 Telecom network integration Goal: achieve coexistence with classical signals to overcome use of dark fiber links 41

42 Photonic integration Scalable, large-scale quantum networks will rely on integrated technologies Low cost, efficiency, reconfigurability, interconnectivity, reproducibility On-chip DVQKD P. Sibson et al, arxiv: University of Bristol Candidate system for full integration: CVQKD on silicon 42

43 2.6 mm Towards on-chip CVQKD 0.5 mm OPSIS IME Foundry Reduce cost and size by orders of magnitude CMOS compatibility 43

44 Proof-of-principle device Alice and Bob on the same chip Main CV-QKD functionalities Shot noise limited homodyne detection Phase and amplitude modulation control 44

45 Telecom silicon photonics vs. CVQKD Si modulator Loss 5 db - Ge photodetector 3 db cut-off 30 GHz ~ 100 GHz Data rate 40 Gbit/s 40 Gbit/s Dark current < 1 μa 1 na Responsivity A/W Extinction ratio (db) 8 40 Gbit/s - Modulators: lower bandwidth (speed is not the main issue) but higher extinction ratio (>30 db) and lower loss carrier depletion, carrier injection, thermal ring resonator Photodetectors: strong linearity for input power up to a few mw, low dark current, high quantum efficiency, shot noise limited High optical attenuation (80 db) without phase drift 45

46 Quantum hacking Theoretical model Some assumptions in security proofs may be incorrect or insufficient Implementation Technological deficiencies/imperfections Eve obtains a portion of the secret key while staying concealed Quantum hacking exploits discrepancy between theoretical model and practical implementation helps strengthen practical QKD! 46

47 Imperfections and side channels for CV-QKD Solutions based on refined security proofs and (measurement) device independence First approach for CV-QKD Modulation not exactly Gaussian Calibration procedures for homodyne detection and phase noise Local oscillator calibration procedure Trojan horse-type of attacks countermeasures! 47

48 Current challenges in quantum cryptography Device independent QKD ultimate solution for side-channel attacks due to practical imperfections possible thanks to recent loophole-free Bell tests but still impractical rates and range Measurement device independent QKD light version of DI-QKD covering attacks due to detectors High security but also everyday applications data centers in cloud computing infrastructures space communications secure ATM transaction devices mobile QKD, ship devices Quantum cryptography beyond QKD and post-quantum cryptography many protocols illustrating quantum supremacy : better-than-classical security design future quantum-safe infrastructure 48

Security and implementation of differential phase shift quantum key distribution systems

Security and implementation of differential phase shift quantum key distribution systems Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume QCRYPT 2013 August 04,2013 IQC, University of Waterloo Canada Saturation Attack on Continuous-Variable Quantum Key Distribution System Hao Qin*, Rupesh Kumar, and Romain Alléaume Quantum Information Team

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Practical Quantum Key Distribution

Practical Quantum Key Distribution Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Continuous-variable quantum key distribution with a locally generated local oscillator

Continuous-variable quantum key distribution with a locally generated local oscillator Continuous-variable quantum key distribution with a locally generated local oscillator Bing Qi, Pavel Lougovski, Raphael Pooser, Warren Grice, Miljko Bobrek, Charles Ci Wen Lim, and Philip G. Evans Quantum

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

arxiv:quant-ph/ v2 7 Nov 2001

arxiv:quant-ph/ v2 7 Nov 2001 Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

High rate quantum cryptography with untrusted relay: Theory and experiment

High rate quantum cryptography with untrusted relay: Theory and experiment High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Practical aspects of QKD security

Practical aspects of QKD security Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc. Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Communications Quantiques

Communications Quantiques Communications Quantiques Hugo Zbinden Groupe de Physique Appliquée Quantum Technologies Université de Genève Cryptographie Quantique Génération de nombres aléatoires Stéganographie basée sur du bruit

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

Perfectly secure cipher system.

Perfectly secure cipher system. Perfectly secure cipher system Arindam Mitra Lakurdhi, Tikarhat Road, Burdwan 713102 India Abstract We present a perfectly secure cipher system based on the concept of fake bits which has never been used

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

Mobile Free Space Quantum Key Distribution for short distance secure communication

Mobile Free Space Quantum Key Distribution for short distance secure communication DEPARTMENT OF PHYSICS LUDWIG-MAXIMILIAN-UNIVERSITY OF MUNICH Master s Thesis Mobile Free Space Quantum Key Distribution for short distance secure communication Tobias Vogl January 21, 216 Supervised by

More information

arxiv:quant-ph/ v1 25 Dec 2006

arxiv:quant-ph/ v1 25 Dec 2006 Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

Other Topics in Quantum Information

Other Topics in Quantum Information p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Quantum cryptography: from theory to practice

Quantum cryptography: from theory to practice Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics

More information

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography APRIL 2017 1 Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography Mario Milicevic, Chen Feng, Lei M. Zhang, P. Glenn Gulak Department of Electrical and Computer

More information

The BB84 cryptologic protocol

The BB84 cryptologic protocol The cryptologic protocol of quantum key distribution Dimitri Petritis Institut de recherche mathématique de Rennes Université de Rennes 1 et CNRS (UMR 6625) Vernam s ciphering Principles of coding and

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Chapter 5 Introduction to Quantum Cryptography Xiaoqing Tan Additional information is available at the end of the chapter http://dx.doi.org/10.5772/56092 1. Introduction Broadly speaking, cryptography

More information

National Institute of Standards and Technology Gaithersburg, MD, USA

National Institute of Standards and Technology Gaithersburg, MD, USA National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

TWO-LAYER QUANTUM KEY DISTRIBUTION

TWO-LAYER QUANTUM KEY DISTRIBUTION TWO-LAYER QUANTUM KEY DISTRIBUTION PAULO VINÍCIUS PEREIRA PINHEIRO and RUBENS VIANA RAMOS paulovpp@gmail.com rubens.viana@pq.cnpq.br Laboratory of Quantum Information Technology, Department of Teleinformatic

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Calculation of the Key Length for Quantum Key Distribution

Calculation of the Key Length for Quantum Key Distribution http://dx.doi.org/10.5755/j01.eee.21.6.13768 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 21, NO. 6, 2015 Calculation of the Key Length for Quantum Key Distribution Miralem Mehic 1, Marcin Niemiec

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate

More information

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/0601168 v2 12 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum

More information

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Simulation of BB84 Quantum Key Distribution in depolarizing channel Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn

More information

Chapter 5. Quantum Cryptography

Chapter 5. Quantum Cryptography Chapter 5. Quantum Cryptography arxiv:1108.1718v1 [quant-ph] 8 Aug 2011 Dag Roar Hjelme Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim,

More information

Fundamental Security Issues in Continuous Variable Quantum Key Distribution

Fundamental Security Issues in Continuous Variable Quantum Key Distribution Fundamental Security Issues in Continuous Variable Quantum Key Distribution arxiv:1208.5827v1 [quant-ph] 29 Aug 2012 Horace P. Yuen Department of Electrical Engineering and Computer Science Department

More information

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Trustworthiness of detectors in quantum key distribution with untrusted detectors Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

Quantum Technologies for Cryptography

Quantum Technologies for Cryptography University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms

More information

QUANTUM KEY DISTRIBUTION PROTOCOLS WITH HIGH RATES AND LOW COSTS

QUANTUM KEY DISTRIBUTION PROTOCOLS WITH HIGH RATES AND LOW COSTS QUANTUM KEY DISTRIBUTION PROTOCOLS WITH HIGH RATES AND LOW COSTS A Thesis Presented to The Academic Faculty by Zheshen Zhang In Partial Fulfillment of the Requirements for the Degree Master of Science

More information

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES Quantum Information and Computation, Vol. 7, No. 5&6 (2007) 431 458 c Rinton Press SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES HOI-KWONG LO Center for Quantum

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

Cryptography: the science of secret communications

Cryptography: the science of secret communications 1 Quantum key distribution a new tool for the secure communications toolbox Richard Hughes Physics Division Los Alamos National Laboratory 505-667-3876; ; http://quantum.lanl.gov cryptographic key transfer

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

A Guide to Experiments in Quantum Optics

A Guide to Experiments in Quantum Optics Hans-A. Bachor and Timothy C. Ralph A Guide to Experiments in Quantum Optics Second, Revised and Enlarged Edition WILEY- VCH WILEY-VCH Verlag CmbH Co. KGaA Contents Preface 1 Introduction 1.1 Historical

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Practical Quantum Coin Flipping

Practical Quantum Coin Flipping Practical Quantum Coin Flipping Anna Pappa, 1, André Chaillloux, 2, Eleni Diamanti, 1, and Iordanis Kerenidis 2, 1 LTCI, CNRS - Télécom ParisTech, Paris, France 2 LIAFA, CNRS - Université Paris 7, Paris,

More information

Key distillation from quantum channels using two-way communication protocols

Key distillation from quantum channels using two-way communication protocols Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle

More information