Sharing and verifying quantum informa3on with differing degrees of trust

Size: px
Start display at page:

Download "Sharing and verifying quantum informa3on with differing degrees of trust"

Transcription

1 Sharing and verifying quantum informa3on with differing degrees of trust Damian Markham Paris Centre for Quantum Compu3ng pcqc.fr

2 Basics Measurements Random State ϕ Projector P r for result Proabibity for result r P r = I r Pr(r) = ϕ P r ϕ Change the state ρ r P r ϕ ϕ P r ϕ Entanglement Super correlations Push / Steer quantum information at a distance P A ϕ I B = ϕ A ϕ B ( 00 AB + 11 AB ) - Measuring A and B in same basis gives same result - Quantum state is transfered (Entanglement destroyed)

3 From philosophy to cryptography EPR 1935 This randomness is weird, we must be missing something a la statistical mechanics -> randomness from ignorance Bell 1964 If there really is a deterministic law of nature assigning measurement results (just we are ignorant of it) correlations are limited S = A, B + A, B' + A', B A', B' 2 -> QM gets S=2.14: no deterministic local model matches this Ekert 1991 If nature cannot predict the correlated results, neither can an eavesdropper! -> Secure shared random key Independent of physical model for correlations -> DEVICE INDEPENDENT SECURITY

4 Entanglement as a resource Z X P 0,1 or P +, P 0,1 or P +, Z X Quantum Key Distribution - Perfect correlations, not shared outside entangled pair (monogomy of entanglement)

5 Entanglement as a resource ϕ (Bell measurement with input ancilla) P ϕ, P Xϕ, P Yϕ, P Zϕ Classical measurement result ϕ Quantum Key Distribution - Perfect correlations, not shared outside entangled pair (monogomy of entanglement) Teleportation - Steers / pushes to state via Bell measurement: Quantum Channel

6 Entanglement as a resource Quantum Key Distribution - Perfect correlations, not shared outside entangled pair (monogomy of entanglement) Teleportation - Steers / pushes to state via Bell measurement: Quantum Channel Blind, verified computation - B does remote computation, without knowing A s measurement is blind to which computation he performs. - A can check the correlations, disabling from cheating Security from checking they share an entangled state

7 Different degrees of trust and fully trust their devices (know measurements) fully trusts her device, does not (only knows his sta3s3cs) Steering Neither nor trust their devices (only know sta3s3cs) Bell non-locality Jones, Wiseman, Doherty, PRA 2007

8 Different degrees of trust and fully trust their devices (know measurements) fully trusts her device, does not (only knows his sta3s3cs) Steering Correla3ons Measurement outomes Measurement senngs P(a, b A, B) = Tr( P a A P b Aρ Sep A,B) Trusted measurements Untrusted non- entangled states Neither nor trust their devices (only know sta3s3cs) Bell non-locality Jones, Wiseman, Doherty, PRA 2007

9 Different degrees of trust and fully trust their devices (know measurements) fully trusts her device, does not (only knows his sta3s3cs) Steering Neither nor trust their devices (only know sta3s3cs) Bell non-locality P(a, b A, B) = Correla3ons Measurement outomes Measurement senngs P(a, b A, B) = Tr( P a A P b Aρ Sep A,B) Trusted measurements λ Untrusted non- entangled states Predetermined (malicious) shared randomness Trusted measurement (A) Untrusted State on A P(λ) Tr( P a Aρ λ A)P(b Bλ) Untrusted measurement and states on B Jones, Wiseman, Doherty, PRA 2007

10 Different degrees of trust and fully trust their devices (know measurements) fully trusts her device, does not (only knows his sta3s3cs) Steering Neither nor trust their devices (only know sta3s3cs) Bell non-locality Jones, Wiseman, Doherty, PRA 2007 P(a, b A, B) = Correla3ons Measurement outomes Measurement senngs P(a, b A, B) = P(a, b A, B) = Tr( P a A P b Aρ Sep A,B) Trusted measurements λ λ Untrusted non- entangled states Predetermined (malicious) shared randomness Trusted measurement (A) Untrusted State on A P(λ) Tr( P a Aρ λ A)P(b Bλ) Untrusted measurement and states on B Predetermined (malicious) shared randomness P(λ) P(a Aλ)P(b Bλ) Untrusted (local) measurement and states on A and B

11 Different degrees of trust and fully trust their devices (know measurements) QKD Ent. Witnesses Quantum channel authen3ca3on Secure secret sharing (prac3cal authentn) fully trusts her device, does not (only knows his sta3s3cs) Steering 1- sided DI- QKD 1- sided DI ent. verifica3on FK verified blind universal QC Neither nor trust their devices (only know sta3s3cs) Bell non-locality Fully DI- QKD Bell inequality RUV verified blind universal QC

12 Different degrees of trust and fully trust their devices (know measurements) QKD Ent. Witnesses Quantum channel authen=ca=on Secure secret sharing (prac=cal authentn) Trust Difficulty fully trusts her device, does not (only knows his sta3s3cs) Steering 1- sided DI- QKD 1- sided DI ent. verifica=on FK verified blind universal QC Neither nor trust their devices (only know sta3s3cs) Bell non-locality Fully DI- QKD Bell inequality RUV verified blind universal QC

13 Different degrees of trust and fully trust their devices (know measurements) QKD Ent. Witnesses Quantum channel authen=ca=on Secure secret sharing (prac=cal authentn) Trust Difficulty fully trusts her device, does not (only knows his sta3s3cs) Steering 1- sided DI- QKD 1- sided DI ent. verifica=on FK verified blind universal QC Neither nor trust their devices (only know sta3s3cs) Bell non-locality Fully DI- QKD Bell inequality RUV verified blind universal QC

14 SQSS prac=cal Quantum Channel Authen=ca=on ϕ wants to share a secret with (or multiple s) such that - only can access the secret - is sure that receives the secret Resources - Shared secure classical key / authenticated classical channel Solved (for single ) [Barnum et al. FOCS 2002] - Uses error correcting codes - entanglement scales with security parameter (impractical!) We get linear security, but with no entanglement scaling (implemented!) - idea: mostly test entanglement and randomly decide where to teleport. Theory: Anne Marin and Damian Markham, ICITS Experiment: B. Bell, DM, D. Herrera- Mar3, A. Marin, W. Wadsworth, J. Rarity and M. Tame Nature Communica3ons 5, 5480 (2014)

15 SQSS prac=cal Quantum Channel Authen=ca=on Authen3cated classical channel Test Teleport Test Non- interac3ve ( to only) Eve assumed to control entangled pairs (but does not know which will be used to teleport) To pass all tests, must be perfect states, thus perfect channel Theory: Anne Marin and Damian Markham, ICITS Experiment: B. Bell, DM, D. Herrera- Mar3, A. Marin, W. Wadsworth, J. Rarity and M. Tame Nature Communica3ons 5, 5480 (2014)

16 SQSS prac=cal Quantum Channel Authen=ca=on Authen3cated classical channel Test Teleport Test Non- interac3ve ( to only) Eve assumed to control entangled pairs (but does not know which will be used to teleport) Test: Z X P 0,1 or P +, P 0,1 or P +, To pass all tests, must be perfect states, thus perfect channel Z X Theory: Anne Marin and Damian Markham, ICITS Experiment: B. Bell, DM, D. Herrera- Mar3, A. Marin, W. Wadsworth, J. Rarity and M. Tame Nature Communica3ons 5, 5480 (2014)

17 Security Projector Pass test = Projector entangled state + ½(guess!)! P ACC = I + φ + φ + $ # " 2 & % Prob (accept false state) < prob (used state is perfect entangled) ϕ ACC Prob (accept false state) = Tr( ( I B P B )ρ B ) Tr( ( I AB P φ + ) ρ ) ACC AB AB 1 S -> linear security -> practical!

18 Implementa=on Experiment implemen=ng (3,4), authen=cated secret sharing B. Bell, DM, D. Herrera- Mar3, A. Marin, W. Wadsworth, J. Rarity and M. Tame Nature Communica3ons 5, 5480 (2014)

19 Conclusions Most security in quantum information can be understood as verification of entanglement and non-locality Differing degrees of trust of devices permited by steering and nonlocality (semi and full device independent) Experimental demonstrations beyond QKD quantum crypto are appearing Next steps: -> Secure multiparty quantum computation -> Leader election -> Quantum money -> Verification of quantum simulation -> Verificaiton of quantum computation ->

20 Thank you! pcqc.fr FREQUENCY CIQWII HIPERCOM

Tutorial: Device-independent random number generation. Roger Colbeck University of York

Tutorial: Device-independent random number generation. Roger Colbeck University of York Tutorial: Device-independent random number generation Roger Colbeck University of York Outline Brief motivation of random number generation Discuss what we mean by a random number Discuss some ways of

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Quantum Cryptography. Chris1an Schaffner. Research Center for Quantum So8ware

Quantum Cryptography. Chris1an Schaffner. Research Center for Quantum So8ware Quantum Cryptography Chris1an Schaffner Research Center for Quantum So8ware Ins1tute for Logic, Language and Computa1on (ILLC) University of Amsterdam Centrum Wiskunde & Informa1ca Physics@FOM, Veldhoven

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Untrusted quantum devices. Yaoyun Shi University of Michigan updated Feb. 1, 2014

Untrusted quantum devices. Yaoyun Shi University of Michigan updated Feb. 1, 2014 Untrusted quantum devices Yaoyun Shi University of Michigan updated Feb. 1, 2014 Quantum power is incredible! Quantum power is incredible! Quantum power is incredible! Spooky action at a distance Quantum

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Quantum Communication

Quantum Communication Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters

More information

Multi-Particle Entanglement & It s Application in Quantum Networks

Multi-Particle Entanglement & It s Application in Quantum Networks Lecture Note 5 Multi-Particle Entanglement & It s Application in Quantum Networks 07.06.006 Polarization Entangled Photons ( ) ( ) ± = Ψ ± = Φ ± ± H V V H V V H H [P. G. Kwiat et al., Phys. Rev. Lett.

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Bell s inequalities and their uses

Bell s inequalities and their uses The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims

More information

Device-independent quantum information. Valerio Scarani Centre for Quantum Technologies National University of Singapore

Device-independent quantum information. Valerio Scarani Centre for Quantum Technologies National University of Singapore Device-independent quantum information Valerio Scarani Centre for Quantum Technologies National University of Singapore Looking for post-doc Commitment to fairness: in case of otherwise equally competent

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv: v3 [quant-ph] 6 Sep 2009 Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,

More information

Entropy Accumulation in Device-independent Protocols

Entropy Accumulation in Device-independent Protocols Entropy Accumulation in Device-independent Protocols QIP17 Seattle January 19, 2017 arxiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline

More information

A semi-device-independent framework based on natural physical assumptions

A semi-device-independent framework based on natural physical assumptions AQIS 2017 4-8 September 2017 A semi-device-independent framework based on natural physical assumptions and its application to random number generation T. Van Himbeeck, E. Woodhead, N. Cerf, R. García-Patrón,

More information

Classical Verification of Quantum Computations

Classical Verification of Quantum Computations Classical Verification of Quantum Computations Urmila Mahadev UC Berkeley September 12, 2018 Classical versus Quantum Computers Can a classical computer verify a quantum computation? Classical output (decision

More information

Einstein-Podolsky-Rosen correlations and Bell correlations in the simplest scenario

Einstein-Podolsky-Rosen correlations and Bell correlations in the simplest scenario Einstein-Podolsky-Rosen correlations and Bell correlations in the simplest scenario Huangjun Zhu (Joint work with Quan Quan, Heng Fan, and Wen-Li Yang) Institute for Theoretical Physics, University of

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

arxiv: v4 [quant-ph] 6 Nov 2012

arxiv: v4 [quant-ph] 6 Nov 2012 Multipartite Entanglement Verification Resistant against Dishonest Parties arxiv:1115064v4 [quant-ph] 6 Nov 01 Anna Pappa, 1, André Chailloux, 3 Stephanie Wehner, 4 Eleni Diamanti, 1 and Iordanis Kerenidis,4

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Unconditionally secure deviceindependent

Unconditionally secure deviceindependent Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline Authentication CPSC 467b: Cryptography and Computer Security Lecture 18 Michael J. Fischer Department of Computer Science Yale University March 29, 2010 Michael J. Fischer CPSC 467b, Lecture 18

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

High rate quantum cryptography with untrusted relay: Theory and experiment

High rate quantum cryptography with untrusted relay: Theory and experiment High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Loophole-free EPR-steering and applications

Loophole-free EPR-steering and applications Loophole-free EPR-steering and applications in testing quantum ump subectivity and in quantum cryptography. Howard M. Wiseman, and Jay M. Gambetta, and C. Branciard, E. G. Cavalcanti, S. P. Walborn, and

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

Quantum Information & Quantum Computation

Quantum Information & Quantum Computation CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles Device-independent Quantum Key Distribution and Randomness Generation Stefano Pironio Université Libre de Bruxelles Tropical QKD, Waterloo, June 14-17, 2010 Device-independent security proofs establish

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY A NOVEL APPROACH FOR SECURE MULI-PARY SECRE SHARING SCHEME VIA QUANUM CRYPOGRAPHY Noor Ul Ain Dept. of Computing, SEECS National University of Sciences and echnology H-1 Islamabad, Pakistan 13msccsnaain@seecs.edu.pk

More information

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

Quantum Correlations as Necessary Precondition for Secure Communication

Quantum Correlations as Necessary Precondition for Secure Communication Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische

More information

The Relativistic Quantum World

The Relativistic Quantum World The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

Cryptography and Security Final Exam

Cryptography and Security Final Exam Cryptography and Security Final Exam Serge Vaudenay 29.1.2018 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices are not

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

arxiv: v1 [cs.cr] 16 Dec 2015

arxiv: v1 [cs.cr] 16 Dec 2015 A Note on Efficient Algorithms for Secure Outsourcing of Bilinear Pairings arxiv:1512.05413v1 [cs.cr] 16 Dec 2015 Lihua Liu 1 Zhengjun Cao 2 Abstract. We show that the verifying equations in the scheme

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension CS 294 Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension Instructor: Sanjam Garg Scribe: Alex Irpan 1 Overview Garbled circuits

More information

Trustworthy Quantum Information. Yaoyun Shi University of Michigan

Trustworthy Quantum Information. Yaoyun Shi University of Michigan Trustworthy Quantum Information Yaoyun Shi University of Michigan QI 2.0 QI 2.0 Some hairy questions QI 1.0: using trusted q. device QI 2.0: using untrusted q. device The device(s) prove to you their trustworthiness

More information

(Quantum?) Processes and Correlations with no definite causal order

(Quantum?) Processes and Correlations with no definite causal order (Quantum?) Processes and Correlations with no definite causal order Cyril Branciard Institut Néel - Grenoble, France!! Workshop on Quantum Nonlocality, Causal Structures and Device-Independent Quantum

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Einstein-Podolsky-Rosen paradox and Bell s inequalities

Einstein-Podolsky-Rosen paradox and Bell s inequalities Einstein-Podolsky-Rosen paradox and Bell s inequalities Jan Schütz November 27, 2005 Abstract Considering the Gedankenexperiment of Einstein, Podolsky, and Rosen as example the nonlocal character of quantum

More information

arxiv: v1 [quant-ph] 18 May 2018

arxiv: v1 [quant-ph] 18 May 2018 Measurement-Device-Independent Quantum Secure Direct Communication, arxiv:1805.078v1 [quant-ph] 18 May 018 Zeng-Rong Zhou, 1,, 3, 4, 5, 6, Yu-Bo Sheng, 7, 8, 9, Peng-Hao Niu, 1,, 3, 4, 5, 6 Liu-Guo Yin,

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

Quantum Cryptographic Network based on Quantum Memories. Abstract

Quantum Cryptographic Network based on Quantum Memories. Abstract Quantum Cryptographic Network based on Quantum Memories Eli Biham Computer Science Department Technion Haifa 32000, Israel Bruno Huttner Group of Applied Physics University of Geneva CH-2, Geneva 4, Switzerland

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Quantum key distribution based on private states

Quantum key distribution based on private states Quantum key distribution based on private states Karol Horodecki (1), Michal Horodecki (1), Pawel Horodecki (2) Debbie Leung (3), Hoi-Kwong Lo (4) & Jonathan Oppenheim (5) (1) Univeristy of Gdańsk, Poland

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Spatio-Temporal Quantum Steering

Spatio-Temporal Quantum Steering The 8 th IWSSQC Dec. 14 (2016) Spatio-Temporal Quantum Steering Y. N. Chen*, C. M. Li, N. Lambert, Y. Ota, S. L. Chen, G. Y. Chen, and F. Nori, Phys. Rev. A 89, 032112 (2014) S. L. Chen, N. Lambert, C.

More information

Steering, Entanglement, nonlocality, and the Einstein-Podolsky-Rosen Paradox

Steering, Entanglement, nonlocality, and the Einstein-Podolsky-Rosen Paradox Griffith Research Online https://research-repository.griffith.edu.au Steering, Entanglement, nonlocality, and the Einstein-Podolsky-Rosen Paradox Author Wiseman, Howard, Jones, Steve, Doherty, A. Published

More information

Other Topics in Quantum Information

Other Topics in Quantum Information p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Universal Blind Quantum Computing

Universal Blind Quantum Computing Universal Blind Quantum Computing Elham Kashefi Laboratoire d Informatique de Grenoble Joint work with Anne Broadbent Montreal Joe Fitzsimons Oxford Classical Blind Computing Fundamentally asymmetric unlike

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /PhysRevA.93.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /PhysRevA.93. Acin, A., Cavalcanti, D., Passaro, E., Pironio, S., & Skrzypczyk, P. (2016). Necessary detection efficiencies for secure quantum key distribution and bound randomness. Physical Review A, 93, [012319].

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. 10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. Clifton, Bub, Halvorson (2003) Motivation: Can quantum physics be reduced to information-theoretic principles? CBH Theorem:

More information

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36 QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING

More information

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer

More information

Security of Device-Independent Quantum Key Distribution Protocols

Security of Device-Independent Quantum Key Distribution Protocols Security of Device-Independent Quantum Key Distribution Protocols Chirag Dhara 1, Lluis Masanes 1, Stefano Pironio 2, and Antonio Acín 1,3(B) 1 ICFO Institut de Ciències Fotòniques, Castelldefels, 08860

More information

SQL injection principle against BB84 protocol

SQL injection principle against BB84 protocol INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS Volume 11, 017 SQL injection principle against BB84 protocol H.Amellal, A.Meslouhi and Y. Hassouni Faculté des Sciences, Département de Physique, LPT-URAC-13,

More information

arxiv: v2 [quant-ph] 9 Nov 2011

arxiv: v2 [quant-ph] 9 Nov 2011 Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et

More information

A. Quantum Key Distribution

A. Quantum Key Distribution A. Quantum Key Distribution The purpose of QKD is to establish a string of random bits (the key ) shared by Alice and Bob, where Alice and Bob can be highly confident that eavesdropper Eve knows almost

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

1. Basic rules of quantum mechanics

1. Basic rules of quantum mechanics 1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 6, 2017 CPSC 467, Lecture 18 1/52 Authentication While Preventing Impersonation Challenge-response authentication protocols

More information

Causality and Local Determinism versus Quantum Nonlocality.

Causality and Local Determinism versus Quantum Nonlocality. Contribution to EMQ13 in Vienna, October 2013 Causality and Local Determinism versus Quantum Nonlocality. UQO marian.kupczynski@uqo.ca Intro It was shown by many authors that the violation of Bell Inequalities

More information

arxiv: v4 [quant-ph] 28 Feb 2018

arxiv: v4 [quant-ph] 28 Feb 2018 Tripartite entanglement detection through tripartite quantum steering in one-sided and two-sided device-independent scenarios arxiv:70086v [quant-ph] 8 Feb 08 C Jebaratnam,, Debarshi Das,, Arup Roy, 3

More information

Multipartite Einstein Podolsky Rosen steering and genuine tripartite entanglement with optical networks

Multipartite Einstein Podolsky Rosen steering and genuine tripartite entanglement with optical networks Multipartite Einstein Podolsky Rosen steering and genuine tripartite entanglement with optical networks Seiji Armstrong 1, Meng Wang 2, Run Yan Teh 3, Qihuang Gong 2, Qiongyi He 2,3,, Jiri Janousek 1,

More information

arxiv: v3 [quant-ph] 17 Dec 2018

arxiv: v3 [quant-ph] 17 Dec 2018 Unconstrained Summoning for relativistic quantum information processing Adrian Kent Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce

More information

Randomness in nonlocal games between mistrustful players

Randomness in nonlocal games between mistrustful players Randomness in nonlocal games between mistrustful players Carl A. Miller and Yaoyun Shi* Source paper: Forcing classical behavior for quantum players by C. Miller and Y. Shi (2016), attached. One of the

More information

Squashed entanglement

Squashed entanglement Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Cryptography and Security Final Exam

Cryptography and Security Final Exam Cryptography and Security Final Exam Solution Serge Vaudenay 29.1.2018 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Trustworthiness of detectors in quantum key distribution with untrusted detectors Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,

More information

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances Hoi-Kwong Lo 1 and H. F. Chau, 2y 1 Hewlett-Packard Labs, Filton Road, Stoke Giord, Bristol BS34 8QZ, U. K. 2 Department

More information

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic

More information

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, A qubit: a sphere of values, which is spanned in projective sense by two quantum

More information

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Technologies: Threats & Solutions to Cybersecurity Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Quantification of Gaussian quantum steering. Gerardo Adesso

Quantification of Gaussian quantum steering. Gerardo Adesso Quantification of Gaussian quantum steering Gerardo Adesso Outline Quantum steering Continuous variable systems Gaussian entanglement Gaussian steering Applications Steering timeline EPR paradox (1935)

More information