Cryptography: the science of secret communications

Size: px
Start display at page:

Download "Cryptography: the science of secret communications"

Transcription

1 1 Quantum key distribution a new tool for the secure communications toolbox Richard Hughes Physics Division Los Alamos National Laboratory ; ; cryptographic key transfer by quantum (single-photon) communications overview of cryptography the BB84 QKD protocol QKD in practice internships are available in all aspects of quantum cryptography: experimental and theoretical physics, mathematics, computer science and electrical engineering

2 Cryptography: the science of secret communications 2 I am fairly familiar with all forms of secret writings The object of those who invented the system has apparently been to conceal that these characters convey a message. Sherlock Holmes The Adventure of the Dancing Men confidentiality encryption renders message unintelligible to 3 rd parties & authentication possible if sender and recipient share a secret: a key main assumption: passive eavesdropping

3 3

4 Kerckhoff s Principles: secrecy resides in the key 4 The system must be physically, if not mathematically, undecipherable; The system must not require secrecy and can be stolen by the enemy without causing trouble; It must be easy to communicate and remember the keys without requiring written notes, it must also be easy to change or modify the keys with different participants; The system ought to be compatible with telegraph communication; The system must be portable, and its use must not require more than one person; Finally, regarding the circumstances in which such system is applied, it must be easy to use and must neither require stress of mind nor the knowledge of a long series of rules.

5 The one-time pad 5 key material is a (truly) random bit sequence XOR= = addition (mod 2) = binary addition without carry unconditionally secure provided key is not reused key is as long as the message Alice encrypts plaintext... A = key cryptogram =... Z open channel Bob decrypts cryptogram key plaintext

6 6

7 (Quantum) Cryptography Eve: enemy cryptanalyst 7 Alice Bob message source encryption decryption destination open channel key source secure channel quantum cryptography = on-demand key transfer by quantum communications detectability and defeat of eavesdropping ensured by laws of physics & information theory avoids latent vulnerability of public key broadcasts passive monitoring ineffective today s quantum cryptography transmissions not vulnerable to tomorrow s technology reduces insider threat: key material does not exist until transmission time compatibility with optical communications/existing & planned infrastructures key distribution

8 8 FIRST QKD PROTOCOL Bennett & Brassard (1984) FIRST QKD EXPERIMENT Bennett et al.(1991) QKD FIBER EXPERIMENTS Rarity, Townsend et al. (UK, > 1994) Franson et al. (APL, 1994) Gisin et al. (Geneva, > 1995) Hughes et al. (LANL > 1995) Bethune et al. (IBM > 1999) Karlsson et al. (Stockholm > 2000) Polzik et al. (Denmark > 2001) FREE-SPACE EXPERIMENTS Franson et al. (1996) Hughes et al. (LANL > 1996) Rarity et al. (UK > 2000) ENTANGLED-PHOTON QKD Gisin et al. (Geneva, > 2000) Zeilinger et al. (Austria, 2000) Kwiat et al. (LANL, UIUC > 2000) SINGLE-PHOTON QKD Yamamoto et al. (2002) Grangier et al. (2002) CONTINUOUS VARIABLE QKD Grangier et al. (2002)

9 Quantum mechanics of ideal single photons & detectors 9 a single photon cannot be split beamsplitter single photon R T 0 detector 1 detector EITHER detector 0 fires OR detector 1 fires not both we cannot predict, even in principle, which detector will fire irreducible randomness of quantum physics

10 Quantum mechanics & (linearly) polarized single photons 10 polarizing beamsplitter polarizing beamsplitter vertically polarized single photon 0 detector θ -polarized single photon 0 detector 1 detector detector 0 never fires detector 1 always fires 1 detector detector 0 fires with prob = cos 2 θ OR, 1 fires with prob = sin 2 θ not both we cannot predict which one implications orthogonal polarization can be distinguished non-orthogonal polarizations cannot be faithfully distinguished after measurement a photon has no memory of its prior polarization [non-orthogonal polarizations cannot be faithfully copied ( no cloning )]

11 Conjugate coding 12 a bit of information can be encoded in orthogonal polarization states of single photons, in different bases: e.g. in the rectilinear basis 0 1 in the diagonal (45 ) basis ( conjugate ) 0 1 the bit can be faithfully decoded if the encoding basis is known if the wrong decoding basis is used, the outcome is random

12 The core ingredients of the BB84 QKD protocol 13 Alice has two sources of random bits long-term secret data bits independent, short-term secret encoding bits Bob has an independent source of short-term secret decoding bits they have a quantum channel allows the faithful transmission of polarized single photons they have a means to perform conjugate encoding and decoding ideal single photon sources and detectors they have an authenticated, but non-secret, conventional public channel they know they are communicating with each other, and not an impersonator ( Eve ) they know that Eve has not substituted her own messages

13 Core ingredients of the BB84 (QKD) Protocol (I) 14 bit encoding Alice 0 1 quantum channel decoding Bob bit value? secret, random bit and encoding secret, random decoding bit value Alice public but authenticated Bob Distilled Secret key sequence sifting: post-select matching encoding/decoding Distilled Secret key sequence

14 Alice data bit Alice basis A B quantum Bob basis An example of BB Bob 1 0/1 0 0/1 0/1 0/1 0 1 detects B A R D D D R R D R public A B Yes No Yes No No No Yes Yes public sift Alice and Bob now share 4 random ( sifted ) bits

15 Points to note 16 From Alice and Bob s perspective: on average the protocol is 50% efficient Alice and Bob cannot predict which bits they will share sifted key is a random sequence of random bits only photons that arrive can enter the sifted key photon loss merely reduces the key rate in practice other photons may enter the quantum channel source of errors? From Eve s perspective cannot passively monitor the quantum channel: a photon cannot be split no possibility of storing information for future analysis public channel conveys no information about the (secret) data bits cannot perform a man-in-themiddle attack public channel is authenticated use quantum physics methods to distinguish the quantum channel states?

16 Example: intercept-resend eavesdropping (I) 17 Eve inserts a polarizer at angle θ? Alice Eve??? Eve can only obtain partial information introduces a disturbance (errors) Bob e.g. 1: Eve tests randomly in the rectilinear and diagonal bases: on average learns 50% of Alice s bits has 50% bit error rate (BER) on the rest once she learns the basis information e.g.2: Eve tests every bit in the Breidbart basis (@ 22.5 ) learns each bit with prob ~ 85% e.g. Alice sends V, Eve tests θ P(Eve correct) = cos 2 θ sends Bob θ P(Eve wrong) = sin 2 θ sends Bob (90 θ) impacts: Eve can gain different types of partial information deterministic or probabilistic necessarily causes a disturbance Bob has a 25% BER if Eve tests every bit

17 Example: intercept-resend eavesdropping (II) 18 Alice Bob s errors Bob s sifted key contain errors relative to Alice s must be removed by further public communications from the number of errors in Bob s sifted key, he and Alice can establish a rigorous upper bound on Eve s partial information this information can be removed by privacy amplification Bob Eve s information Eve Eve's BER Bob's BER bit error rate (BER) bit error rate (BER) Eve e.g. Eve tests 40% of the bits Bob Eve's angle (degrees) Eve s polarizer angle

18 Bisective search interactive error correction: BINARY 1 19 [1] Bennett et al. (1991).

19 Reconciliation: post-facto error correction 20 Alice and Bob have sifted keys; Bob s has errors they communicate parity bits to find and correct errors e.g. bisective search: Eve gains side-information : at BER ε f(ε) = -log 2 ε (1 ε)log 2 (1 ε) bits/sifted bit (Shannon limit) reduces secret bit yield Alice: Bob : parity bits revealed to correct one error Alice Bob yield after error correction Shannon 1.19 Shannon bisective (data) Eve Eve s side information quantum BER

20 Estimating Eve s information 21 Bob finds that his sifted key has a BER = ε Alice and Bob conservatively assume an (optimal) strategy for Eve e.g. Eve intercepts/resends a portion p in the Breidbart basis (@ 22.5 ) Alice Eve Bob??? Eve would cause a BER, ε = 25% on a portion p of Bob s sifted key Alice and Bob estimate p from Bob s observed sifted BER, ε p = 4 ε Alice and Bob have an upper bound on Eve s knowledge of their reconciled keys a portion p, on which she knows each bit with prob ~ 0.85; guesses (1 p)

21 How to extract a secret 22 Alice and Bob have 6 bits: a, b, c, d, e, f e.g. 2. Eve has probabilistic information: she KNOWS x = {a, b, c, d, e, f} with p = ½, guesses otherwise e.g. 1. they KNOW Eve knows 3 deterministic bits, but not which three they can extract 2 SECRET bits: a b c d and c d e f Alice and Bob cannot extract ANY secret bit by hashing e.g. with probability ¾ Eve KNOWS a b c d e f combines known bits with unknown ones result = unknown Bennett et al. (1984): privacy amplification by public discussion hashing erases Eve s information in general: how much secret information can Alice and Bob extract (by hashing to a shorter final key)?

22 Side information? 23 Eve may also have side information: error correction bits Bob s sifted key has a BER = ε Alice and Bob conservatively assume the Breidbart strategy for Eve after reconciliation they use public communications to agree on which random subset parities to use as their secret key yielding: r = 1 4 ε log [ ε log 2 ε + ( 1 - ε ) log 2 ( 1 - ε ) ] secret bits / sifted bit (Shannon limit)

23 INGREDIENTS of QKD cryptographic quality random bits sifting error correction estimate bound on information leakage privacy amplification authentication entity identification message authentication key confirmation randomness tests standards Alice generates a secret random bit sequence Quantum transmissions from Alice to Bob sifting Alice & Bob reveal their encoding/decoding reconciliation error correction, bound Eve s information privacy amplification extract secret bits authentication of public channel messages, key confirmation final, secret key Security statement keys agree with overwhelming probability pass randomness tests Eve knows << 1 bit deception probability << 1 cryptography 24

24 Secrecy efficiency: ideal system 25 secrecy efficiency transmission protocol error = x & detection efficiency x correction x privacy amplification secret bits per initial bit physics introduce errors physics information theory reveals side information information theory collision entropy side information secrecy efficiency after error correction and privacy amplification against intercept/resend 0.8 ec + pa secret bit yield ad + ec + pa QKD may not be possible EVEN IF photons can be transmitted and detected sifted bit error rate

25 What does QKD offer? 26 from one-time authentication to self-sustaining key distribution drastically narrows an adversary s scope & window of opportunity: break initial authentication in real-time and attempt an invasive man-in-themiddle attack AUTHENTICATION quantum communications + information theory KEY DISTRIBUTION self-sustaining, copious shared secret key short, shared initial secret key replenish ENCRYPTION &/or AUTHENTICATION key key transfer (or key generation??)

26 Practical light sources, quantum channel & photon detectors single photon = weak Poissonian ( ) P n n e = n! = µ < 1 µ n µ sometimes send > 1 photon: security? detector efficiency = η PD µη ( 1 e ) = sometimes don t detect it ( ) P n = e n! µ n µ loss T ( ) P n loss = random partitioning T µ e = n! n = Tµ no-photon fraction and loss make it harder for Alice and Bob multi-photon fraction & noise introduce new opportunities for Eve revised privacy amplification secret bit rate? 27 ( Tµ ) n

27 Free-space QKD makes many types of secure key transfer possible 28 challenges photon production, transmission and detection atmospheric optics background photons timing and synchronization pointing, acquisition and tracking

28 The atmospheric QKD quantum channel low-loss transmission wavelength; high-efficiency detectors 29 secrecy efficiency as a function of wavelength: Proc SPIE 4635, 116 (2002) ~ 780 nm is optimal for QKD through the atmosphere single-photon detection with Si APDs challenges background photons daylight radiance ~ photons s -1 cm -2 Å -1 str -1 ~ 10 7 photons mode -1 temporal filtering: ~1 ns spectral filtering: 0.1 nm ~40,000 modes spatial filtering: 220-µrad FOV day/night ~ 10 6 Atmospheric transmission vs. wavelength Daylight background synchronization and timing atmospheric optics? not birefringent; intermittency: ~ 0.01-s

29 Free-space quantum key distribution Richard Hughes, Jane Nordholt, Derek Derkacs and Charles Peterson Transmitter Alice Sample of key material at 10-km range (day) one-airmass path: comparable optics to satellite-to-ground 30 A: B: A: B: key transferred by 772-nm single-photon communications 1-MHz sending rate; ~600-Hz key rate day: 45,576 secret bits/hour ; night: 113,273 secret bits/45 mins Receiver Bob From Pajarito Mtn., Los Alamos, NM to TA53, Los Alamos National Laboratory Transmitter Alice

30 BB84 subsystem 31 monolithic randomizer chip 2-MHz clock rate 1-MHz signal rate BB84 photons: attenuated 772-nm lasers 1-s quantum transmissions single-photon detectors: cooled Si APDs passive quench; η~61%; dead time ~ 1 µs quantum random number generation multi-detector system: upper bound on multiphoton pulses Alice 0 V - H basis 1 0 V - H basis laser 4 S1 S2 S3 S4 detector ± 45º basis ± 45º basis 1 beam monitor Bob 1

31 10-km atmospheric QKD range 32 Alice Bob

32 sifted bits / transmitted bit night: 18:45 to 19:29 MST 192,925 sifted bits noise, C ~ 1-2 s -1 detector dark counts channel efficiency, η opt / noise, C 10-km sifted key data: 4 October, 2001 photon number, µ 33 daylight: 17:42 to 18:44 MST 394,004 sifted bits noise, C < 50 s -1 background ~ 2 mw cm -2 µm -1 str -1 # sifted bits ~ µ η opt sifted BER, ε ~ C/ µ η opt photon number, µ transmitter channel efficiency, η opt receiver noise, C

33 Realistic security : BBBSS91 privacy amplification from sifted bits to secret bits cf. Bennett et al. (1991) 34 no photon one photon multi- photon µ = probability assume Eve identifies all multi-photon signals attribute all errors to intercept/resend on single-photon signals Eve gains error correction information privacy amplification Eve s collision entropy per bit is R ( ) ( ) 1 µ 4εlog εlog2ε + 1 ε log2 1 ε Alice and Bob extract ~ R secret bits/sifted bit by universal hashing random Boolean matrix no secrecy in certain parts of parameter space optimal choice of µ

34 e.g. in daylight from 18:40:26-18:40:27 MDT 4 October, In 1 s, from 10 6 transmitted bits with photon number µ = 0.29 Alice and Bob produce 651 (partially secret) sifted bits with 21 errors (BER, ε = 3.2%): Alice s and Bob s 264-bit final secret key: (produced as parities of random subsets) µ = 0.29 no photon one photon multi- photon probability Eve s entropy > 651 bits -155 bits (side information: error correction) - 40 bits (intercept-resend) -171 bits (multi-photon) - 2 bits (side information: bias) - 20 bits (safety factor) = 264 bits (secret) Eve s expected information < 10-6 bits

35 10-km secrecy efficiency: 4 October, 2001 (secret bits per transmitted bit) 36 produce ~ secret bits per 1-s transmission secrecy efficiency secret bits cannot be transferred in some regimes channel efficiency, η opt / noise, C photon number, µ photon number, µ transmitter channel efficiency, η opt receiver noise, C max ground-to-ground range (this system): 30 km (day); 45 km (night)

36 Secret key generated by free-space quantum communications over 10-km range e.g. 4 October, 2001 (daylight): 50,783 bits e.g. 4 October, 2001 (night): 118,064 bits

37 UNCLASSIFIED One-time pad encryption of an image using final key (error correction, privacy amplification & check) 38 Encrypted Image Alice encrypts by adding a word of her key to each pixel Bob decrypts by subtracting a word of his key from each pixel

38 Technologically feasible USD eavesdropping: Eve replaces quantum channel with a classical one? Bennett et al. (1991) 39 Yuen (1995) Chefles and Barnett Dusek et al transmitter receiver accessible loss = 1 - η opt yes yes can only be conventional channel transmitter yes receiver Eve no security: need three-photon emission < single-photon detection upper bound on photon number in terms of accessible loss: µ 3 /32 < η opt µ

39 PNS eavesdropping: strongest individual attack (not technologically feasible) 40 Eve intercept / resend single photon transmitter QND receiver n > 1 photons split store one photon (n - 1) photons lower-loss channel basis information uniquely identified security: need multi-photon emission < single-photon arrival upper bound on photon number in terms of accessible loss: µ 2 /2 < ηµ

40 Unconditionally-secure cryptographic authentication C. Wipf & K. Tyagi 41 protection against man-in-the-middle? Alice must know she is talking with Bob, and vice-versa impersonation? authentication of public channel communications substitution? Alice and Bob share a short (short-term) secret authentication key compute a keyed hash; apply as authentication tag cost is small: logarithmic in # bits authenticated ALICE BOB public communication tag A public communication tag hash function hash function tag B? authentication key authentication key

41 Authentication results: 10-km data from 4 October, bits sacrificed per successful QKD session mutual authentication with cumulative P d < 10 7 self-sustaining 10 km data: cumulative secret bits secret bits sacrificed bits authenticated bits Run run number

42 Atmospheric optics of 10-km path km path has extinction (1 AM), background and capture efficiency comparable to a path to space airmass : a measure of atmospheric extinction (and seeing ) zenith path from Los Alamos has ~ 0.8 AM AM = 1 AM = sec z height of atmosphere z sea level

43 Conceptual QKD LEO satellite downlink 44 downlink: turbulence in far field no leadahead/isoplanatism issue detectors on ground less susceptible to DoS 1 micro-radian pointing jitter on satellite 5 micro-radian tracking jitter at receiver LEO satellite 20-cm transmitter ~ m range ~ 5-m footprint ground station 50-cm receiver

44 Los Alamos 48-km optical fiber quantum key distribution experiment km fiber path Alice Bob receiver transmitter

45 The QKD Quantum Channel low-loss transmission medium; high-efficiency detectors 46 optical fiber QKD over telecommunications fiber networks? challenges: single-photon detection at 1.3 µm, (1.55 µm) Attenuation Coefficient vs Wavelength (Ge), InGaAs APDs Rarity et al., Cova et al., Gisin et al., Morgan et al. e.g. InGaAs APDs (Fujitsu) cooled to 140 K detection efficiency, time-resolution and noise increase with over-voltage 20% efficiency, 50 khz noise time-resolution [ps] dark counts [khz] noise = 7.4exp(9.2η) [khz] high noise rate can be offset by sub-ns time-resolution efficiency, η

46 QKD using single-photon interference 47 t ~ 300 ps attenuator long path T ~ 5 ns electro-optic phase-shifter Bob 1.3-µm pulsed laser 50/50 fiber couplers 48 km of underground optical fiber long-short (Alice) + short-long (Bob) interference: φ 1 Alice φ 2 air gap U L Cooled InGaAs APD detectors U detector η ~ 11% n ~ ±1.24% visibility 100kHz sending rate 22.9 db loss Counts/600s Counts/600s φ = 0 φ = π/2 φ=0 φ=π/ Counts/600s Time (ns) Time (ns) 400 φ φ=π= π φ = φ=3π/2 3π/2 Counts/600s Time (ns) Time (ns)

47 BB84 key generation 48 (0,1): φ A = (0,π) OR (π/2,3π/2) φ B = (0,π/2) 1.3-µm pulsed laser Alice φ µm pulsed laser WDM fiber couplers Room temp InGaAs APD φ 2 Bob U L Cooled InGaAs APD detectors Sample of 48-km BB84 key bits A B A B BER ~ 9.3 %; key rate ~ 20 Hz (2x B92)

48 QKD is evolving along dual tracks: theoretical secrecy & practical security 49 theoretical secrecy Bennett-Brassard 1984 authentication + quantum communications + information theory = QKD practical security computational security heritage influx QKD today security proofs capability enhancement? unconditional security future secure communications needs

Security and implementation of differential phase shift quantum key distribution systems

Security and implementation of differential phase shift quantum key distribution systems Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Practical aspects of QKD security

Practical aspects of QKD security Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc. Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

Practical Quantum Key Distribution

Practical Quantum Key Distribution Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

National Institute of Standards and Technology Gaithersburg, MD, USA

National Institute of Standards and Technology Gaithersburg, MD, USA National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer

More information

Quantum key distribution

Quantum key distribution Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Quantum key distribution: theory for application

Quantum key distribution: theory for application Appl. Phys. B 69, 395 400 (1999) / Digital Object Identifier (DOI) 10.1007/s003409900167 Applied Physics B Lasers and Optics Springer-Verlag 1999 Quantum key distribution: theory for application N. Lütkenhaus

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Full polarization control for fiber optical quantum communication systems using polarization encoding

Full polarization control for fiber optical quantum communication systems using polarization encoding Full polarization control for fiber optical quantum communication systems using polarization encoding G. B. Xavier, G. Vilela de Faria, G. P. Temporão and J. P. von der Weid* Pontifical Catholic University

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Error Reconciliation in QKD. Distribution

Error Reconciliation in QKD. Distribution Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,

More information

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad Sepehri Sharbaf Senior IEEE Member California State University Dominguez Hills Computer Science

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

arxiv:quant-ph/ v2 7 Nov 2001

arxiv:quant-ph/ v2 7 Nov 2001 Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

Communications Quantiques

Communications Quantiques Communications Quantiques Hugo Zbinden Groupe de Physique Appliquée Quantum Technologies Université de Genève Cryptographie Quantique Génération de nombres aléatoires Stéganographie basée sur du bruit

More information

arxiv:quant-ph/ v1 12 Nov 1999

arxiv:quant-ph/ v1 12 Nov 1999 Security Aspects of Practical Quantum Cryptography Gilles Brassard 1, Norbert Lütkenhaus 2, Tal Mor 1,3 and Barry C. Sanders 4 1 Département IRO, Université de Montréal, C.P. 6128, succ. centre ville,

More information

arxiv:quant-ph/ v1 26 Mar 2001

arxiv:quant-ph/ v1 26 Mar 2001 Performance of Photon-Pair Quantum Key Distribution Systems Z. Walton, 1 A. V. Sergienko, 1,2 M. Atatüre, 2 B. E. A. Saleh, 1 and M. C. Teich 1,2 1 Quantum Imaging Laboratory, Department of Electrical

More information

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

The battle between cryptographers, who encrypt messages, and cryptanalysts, who break those codes, has raged for centuries. As quantum computing

The battle between cryptographers, who encrypt messages, and cryptanalysts, who break those codes, has raged for centuries. As quantum computing The battle between cryptographers, who encrypt messages, and cryptanalysts, who break those codes, has raged for centuries. As quantum computing promises to help cryptanalysts break many of the encryption

More information

arxiv:quant-ph/ v1 25 Dec 2006

arxiv:quant-ph/ v1 25 Dec 2006 Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Efficient Quantum Key Distribution. Abstract

Efficient Quantum Key Distribution. Abstract Efficient Quantum Key Distribution M. Ardehali, 1 H. F. Chau, 2 and Hoi-Kwong Lo 3 1 Research Labs, NEC Corporation, Sagamihara, Kanagawa 229, Japan and 4-31-12-302, Atago Center, Tama-shi, Tokyo, Japan

More information

A Simulative Comparison of BB84 Protocol with its Improved Version

A Simulative Comparison of BB84 Protocol with its Improved Version JCS&T Vol. 7 No. 3 October 007 A Simulative Comparison of BB84 Protocol with its Improve Version Mohsen Sharifi an Hooshang Azizi Computer Engineering Department Iran University of Science an Technology,

More information

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

Quantum cryptography -the final battle?

Quantum cryptography -the final battle? Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A This presentation Quantum mechanics Introduction Notation Polarized

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Simulation of BB84 Quantum Key Distribution in depolarizing channel Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn

More information

quantum distribution of a sudoku key Sian K. Jones University of South Wales

quantum distribution of a sudoku key Sian K. Jones University of South Wales Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

arxiv:quant-ph/ v2 18 Jan 1999

arxiv:quant-ph/ v2 18 Jan 1999 Estimates for practical quantum cryptography Norbert Lütkenhaus Helsinki Institute of Physics, PL 9, FIN-0004 Helsingin yliopisto, Finland (October 8, 208) In this article I present a protocol for quantum

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD Mohamed Youssef Khalaf Elwadeya

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography International Journal of Quantum Information c World Scientific Publishing Company Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography Karl Svozil Institut für

More information

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Crypto against modern computers No known attack against RSA, AES,... yet They are not proven (and they cannot be) Crypto against modern computers

More information

A Matlab Realization of Shor s Quantum Factoring Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm 1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,

More information

arxiv:quant-ph/ Jan 2000

arxiv:quant-ph/ Jan 2000 Quantum cryptography with 3-state systems Helle Bechmann-Pasquinucci 1 and Asher Peres 2 1 Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland 2 Department of Physics, Technion

More information

Secret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result

Secret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result Secret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result Ueli Maurer, Fellow, IEEE Stefan Wolf Abstract This is the first part of a three-part paper on secret-key

More information

Chapter 5. Quantum Cryptography

Chapter 5. Quantum Cryptography Chapter 5. Quantum Cryptography arxiv:1108.1718v1 [quant-ph] 8 Aug 2011 Dag Roar Hjelme Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim,

More information

Calculation of the Key Length for Quantum Key Distribution

Calculation of the Key Length for Quantum Key Distribution http://dx.doi.org/10.5755/j01.eee.21.6.13768 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 21, NO. 6, 2015 Calculation of the Key Length for Quantum Key Distribution Miralem Mehic 1, Marcin Niemiec

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

TWO-LAYER QUANTUM KEY DISTRIBUTION

TWO-LAYER QUANTUM KEY DISTRIBUTION TWO-LAYER QUANTUM KEY DISTRIBUTION PAULO VINÍCIUS PEREIRA PINHEIRO and RUBENS VIANA RAMOS paulovpp@gmail.com rubens.viana@pq.cnpq.br Laboratory of Quantum Information Technology, Department of Teleinformatic

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES Quantum Information and Computation, Vol. 7, No. 5&6 (2007) 431 458 c Rinton Press SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES HOI-KWONG LO Center for Quantum

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Practical Quantum Cryptography: A Comprehensive Analysis (Part One)

Practical Quantum Cryptography: A Comprehensive Analysis (Part One) MTR00W0000052 MITRE TECHNICAL REPORT arxiv:quant-ph/0009027v5 4 Dec 2003 G. Gilbert M. Hamrick September 2000 Practical Quantum Cryptography: A Comprehensive Analysis (Part One) Sponsor: The MITRE Corporation

More information

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances Hoi-Kwong Lo 1 and H. F. Chau, 2y 1 Hewlett-Packard Labs, Filton Road, Stoke Giord, Bristol BS34 8QZ, U. K. 2 Department

More information