Xiongfeng Ma Center for Quantum Information
|
|
- Kevin Welch
- 5 years ago
- Views:
Transcription
1 Xiongfeng Ma Center for Quantum Information 1
2 Outline Background Quantum entanglement and cryptography From EPR to entanglement Quantum cryptography Quantum coherence and randomness Coherence Intrinsic randomness and coherence 2
3 Cryptography 3
4 Information security National security Individual privacy 4
5 Cryptography Cryptography Science of encoding and decoding secret messages Cryptology Public key cryptosystem (such as RSA, Diffie-Hellman) Cryptanalysis Hacking Alice Bob 5
6 Cryptography in history 2000 BC War 6
7 Basic concepts Plaintext Message in its natural format readable by an attacker Ciphertext Message altered to be unreadable by anyone except the intended recipients Key Sequence that controls the operation and behavior of the cryptographic algorithm Cryptosystem Combination of algorithm, key, and key management functions used to perform cryptographic operations 7
8 Objectives Confidentiality Integrity Authenticity Nonrepudiation Access Control 8
9 Cryptographic Methods Symmetric Same key for encryption and decryption Key distribution problem E.g., DES, AES, IDEA, Blowfish, OTP, Asymmetric Mathematically related key pairs for encryption and decryption Public and private keys E.g., Diffie-Hellman, RSA, Hybrid Combines strengths of both methods Asymmetric distributes symmetric key, also known as a session key Symmetric provides bulk encryption Example: SSL negotiates a hybrid method 9
10 Private key cryptosystem One-time pad (OTP): proven secure by Shannon Alice and Bob share two identical keys secretly. Message Key Encode XOR Decode Counter example: like it or not? XOR Code Key Code Message Alice Key Distribution Bob 10
11 Cryptographic Key Identical Faithful decryption Private Secure communication At least as long as the message An efficient way to distribute key 11
12 Cryptanalysis The study of methods to break cryptosystems Often targeted at obtaining a key Attacks may be passive or active Kerckhoff s Principle The only secrecy involved with a cryptosystem should be the key Cryptosystem Strength How hard is it to determine the secret associated with the system? 12
13 Hacking Brute force attack Trying all key values in the keyspace Dictionary attack Find plaintext based on common words Factoring attack Find keys through prime factorization Quantum computer 13
14 Randomness: foundation of security Snowden s documents on random number generator backdoor On the Possibility of a Back Door in the NIST SP Dual Ec Prng We cannot trust Intel and Via s chip-based crypto, FreeBSD developers say Crypto requires information-theoretic randomness! 14
15 Why Quantum Cryptography 15
16 Conventional Cryptography Application framework Military and diplomatic applications E-Commercial Cryptosystem Computational assumptions (e.g., RSA crypto assumes factoring is hard) 16
17 What is wrong with conventional cryptography? Unanticipated Advances in Hardware and Algorithms. Quantum Code-breaking Cryptographers do not sleep well. Cryptography is for the paranoid. In history, every advance in code-making has been defeated by advances in code-breaking with disastrous consequences to users. 17
18 Unanticipated Advances in Hardware and Algorithms Code-breaking of Enigma led to fore-runners of computers German Enigma Machine 10 million billion possible combinations! Looked unbreakable. Allied code-breaking machine bombe Enigma Broken! 18
19 Quantum Code-breaking Shor s algorithm: Factoring is easy with a quantum computer! Quantum computing can efficiently break: RSA Discrete logarithm problem: Diffie-Hellman key exchange Elliptic-curve cryptographic systems If a quantum computer is ever built, much of conventional Cryptography will fall apart! (Brassard) 19
20 Forward security? Trade secrets and government secrets are kept as secrets for decades (say 70 years). A Big Problem RIGHT NOW: If adversary can factor in 2087, she can then decrypt all traffic sent today. (She can save all communications in 2017.) Was there any computer 70 years ago? What will a computer look like 70 years from now? It is ridiculous to think that we know the future 70 years from now. 20
21 ENIAC 1946 The world's first electronic digital computer 21
22 Cell phone
23 Computer in
24 Quantum Cryptography Application framework Military and diplomatic applications E-Commercial Cryptosystem Quantum Mechanics 24
25 Quantum Cryptography Cryptology (QKD): security proof, enhance the performance and security Cryptanalysis (hacking): attack a practical system 25
26 When shall we implement Kept secure: x Quantum crypto implementation: y Quantum computing: z [Mosca, ISACA Journal vol. 5 (2015)] 26
27 Quantum crypto is exciting! 27
28 28
29 Commercial Quantum Crypto Products available on the market a decade ago! MagiQ Tech, ID Quantique, QuantumTrek, QASKY, Very practical field 29
30 USA QKD network DARPA Battelle Smartgrid First field test of QKD network (2004) 30
31 Japan: Tokyo network The Tokyo QKD network is constructed in a part of the NICT open test-bed network "Japan Giga Bit Network 2 plus by the project teams consisting of nine research group from Japan and Europe (2015) 31
32 Mitsubishi: Quantum Communication Mobile phone Communication speed : 1 Kb/s Store 2 GB keys It is possible to talk for 10 days (240 hours) 32
33 Europe SECOQC Focused on development of a global network for secure communication based on quantum cryptography (2008) 33
34 Swiss election uses quantum cryptography 34
35 Switzerland Geneva network N. Gisin (2009)
36 South Africa Durban Quantum Network Distance 2.6 km~27 km First Quantum Network in Africa (2009) 36
37 Melbourne Quantum Network Melbourne established commercial Quantum Network Establish the network between space and ground Collaborate with NASA/JPL (2010) 37
38 China s Quantum Secure Backbone project Total Length 2000 km trustable relay nodes 31 fiber links Metropolitan networks Existing: Hefei, Jinan New: Beijing, Shanghai Customer: China Industrial & Commercial Bank; Xinhua News Agency; China Banking Regulatory Commission GDP 35.6% ($3 trillion) Population 25.8% (0.3 billion) Beijing Hefei Jinan Shanghai 38
39 Quantum Satellite First quantum satellite, Mozi 1:40am, August 16,
40 Back to science: Entanglement 40
41 Quantum state and measure State Describe a system: contains a full set of parameters in different degrees of freedoms Wave function (ray), density matrix Measure Observable: tools to obtain information Projection, POVM 41
42 Quantum intrinsic randomness Given a known system and a known measurement device, shall the outcome be predetermined? Einstein, God does not play dice! Bohr, Albert, stop telling God what to do! 42
43 Einstein-Podolsky-Rosen Paradox Is Quantum Mechanics complete? Local hidden variable Entanglement A pair of particles: measure on one particle would instantaneously affect the state of the other Spooky action at a distance 43
44 Bell s inequality Quantum mechanics vs. local hidden variable From wikipedia.org 44
45 Non-local game Two players, Alice and Bob, are space-like separated Alice (B0b) given a random bit, x (y), say, by the referee Alice (B0b) outputs a bit, a (b) They win the game if aa bb = xxxx Classical limit? Sc= Quantum limit? Sq= xx Alice aa yy Bob bb 45
46 EPR pairs in reality Various physical systems Alain Aspect 81: Bell s inequality experiment demo 46
47 Entanglement EPR pair 00>+ 11> = ++>+ --> Non-locality --- Entanglement Local hidden variable: been ruled out by Bell s inequality test Non-local correlation: why quantum mechanics is weird Natural source for secure key Strong correlation Randomness in nature Cannot be eavesdropped --- no local hidden variable EPR pair means perfect key 47
48 Quantum Teleportation Sci-Fi Instant transportation Teleport materials 48
49 Teleportation How to send a quantum state aa 1 + bb 1 faithfully? Classically, the values of aa and b are continuous, so it requires a large amount of information transmission Heisenberg s uncertainty principle What if Alice and Bob have a pre-shared entangled state? Only needs to transfer 2 classical bits 49
50 Quantum key distribution (QKD) 50
51 Quantum key distribution (QKD) BB84 (Bennett & Brassard 1984) Alice Bob X11X0 Eve X10X X11X0 0: 1:
52 A few observations Random keys are distributed via QKD systems Alice does not send messages directly Users can safely discard keys if they feel the channel is insecure without causing any security problem Secure keys are used in later cryptosystems: composable A successful attack by Eve Eve obtains non-trivial amount of information about the final key without Alice and Bob s notice If Alice and Bob do not end up with any secure key, the attack is a failure Channel is totally insecure Classical channel: authentication 52
53 Summary (take home message) QKD systems distribute keys QKD does not replace all the current cryptosystems QKD does not replace current communication systems An ideal private key Identical: Alice and Bob share the same key Private: Eve has no (or up to trivial amount of) information about the final key Post processing Error correction: all classical, e.g., Cascade, LDPC Privacy amplification: shorten the key so that Eve s information is eliminated; the focus of all security proofs 53
54 From entanglement to secure QKD 54
55 A quick review Prepare-and-measure protocols BB84, six-state Entanglement based protocols Ekert91, BBM92 Unconditional security proof Mayers (1996) Lo and Chau (1999) Shor and Preskill (2000) Devetak and Winter (2003), Renner (2005) Security analysis for QKD with imperfect devices E.g. Mayers, Lütkenhaus, ILM Koashi-Preskill Gottesman-Lo-Lütkenhaus-Preskill (GLLP) 55
56 Entanglement-based protocols BBM92 Alice (or Eve) prepares an EPR pair Ψ AAAA = Alice and Bob each measures one half of the pair Z basis measure (bit) 0 or 1 X basis measure (phase) or 0 1 Eve 56
57 Lo-Chau security proof I Lo and Chau, 1999 Entanglement distillation Distill perfect EPR pairs from imperfect ones Bell basis: 00>+ 11>, 01>+ 10>, 00>- 11>, 01>- 10> Objective: 00>+ 11> Bit errors (Z) 01>+ 10> Phase errors (X) 00>- 11> Both bit and phase errors (Y) 01>- 10> 57
58 Lo-Chau security proof II Bit error correction (Z: 0,1) Bit errors: 01>+ 10> and 01>- 10> After bit error correction: 00>+ 11> or 00>- 11> Phase error correction (X: +,-) Phase errors: 00>- 11> or 01>- 10> After phase error correction: 00>+ 11> or 01>+ 10> Share (almost) pure EPR pairs 00>+ 11> Measure in Z basis to get final key Almost perfect privacy (randomness) Security: think of teleportation 58
59 Shor-Preskill security proof I Shor and Preskill, 2000 Problem with Lo-Chau proof Requires quantum computers Reduce to prepare-and-measure schemes Put the final key measurement ahead before error corrections Commute operations in quantum mechanics Error correction: classical methods Privacy amplification: key point of all security proofs 59
60 Shor-Preskill security proof II Bit error correction becomes regular error correction Enables Alice and Bob shares identical keys H(bit error rate): Shannon entropy Phase error correction becomes privacy amplification Enables Alice and Bob shares private keys H(phase error rate): Shannon entropy Final key rate 1-H(bit error rate)-h(phase error rate) Symmetry of BB84 Between X and Z basis Basis-independent source: bit error rate=phase error rate 1-2H(QBER) Not optimal: can be enhanced by two-way LOCC 60
61 Post-processing Ma et al.,computers & Security 30, (2011) Fung, Ma, and Chau, Phys. Rev. A 81, (2010) N. Lütkenhaus, Phys. Rev. A 59, 3301 (1999): using error verification to replace error testing. Towards post-processing standard: SECOQC Workshop, Quantum Works QKD Meeting (Waterloo, Canada) Workshop, Finite-Size Effects in QKD (Singapore) 61
62 Quantum coherence and randomness Ma, Yuan, Cao, Qi, and Zhang, Quantum random number generation," npj Quantum Information 2, 16021, (2016) Streltsov, Adesso, and Plenio, Quantum Coherence as a Resource, arxiv: Yuan, Zhou, Cao, and Ma, Intrinsic randomness as a measure of quantum coherence," Phys. Rev. A 92, , (2015) 62
63 What is Coherence? Coherent interference Schrodinger s cat 63
64 Schrodinger s cat: a modern description Classical cat: ρρ cc = 1/2( ) ρρ cc = Quantum cat: ρρ qq (0,0) = 1/2( )( ) ρρ qq = The difference between a quantum and classical cat
65 Measure qubit coherence General quantum cat: ρρ qq αα, ββ = (sin αα 0 + ee iiii cos αα 1 )( 0 sin αα + 1 ee iiii cos αα) ρρ qq (αα, ββ) = 1 sin 2 αα ee iiii sin αα cos αα 2 ee iiii sin αα cos αα cos 2 αα There exists coherence as long as sin αα cos αα 0. A measure for coherence: ee iiii sin αα cos αα? How about mixed quantum state? Generally, CC ρρ = ii jj ρρ iiii?
66 Framework of quantum coherence d-dimensional Hilbert space Classical computational basis: I = Incoherent state is defined by dd δδ = pp ii ii ii ii=1 ii }, ii = 1, 2,, dd. And incoherent operation is defined by incoherent completely positive trace preserving (ICPTP) maps, Φ ICPTP ρρ = KK nn ρρkk nn where nn KK nn KK nn = II and nn KK nn δδkk nn = δδδ T. Baumgratz, M. Cramer, and M. B. Plenio PRL 113, (2014) nn
67 A framework of quantum coherence
68 Coherence measures Relative entropy of coherence CC rel.ent. ρρ = SS ρρ diag Off-diagonal elements (l1-norm): SS ρρ CC ll1 l2-norm: (C2b is violated) CC ll2 Coherence of formation ρρ = min δδ ρρ = min δδ ρρ, δδ ll1 = ii jj ρρ, δδ 2 ll2 = ii jj ρρ iiii ρρ iiii 2 CC CCCC ρρ = min pp ee CC II ( ψψ ee ) {pp ee, ψψ ee } ee where the minimum is runs over all possible decomposition of ρρ
69 Questions What is the operational meaning? From a resource perspective, what does coherence mean? 69
70 Quantum intrinsic randomness Einstein, God does not play dice! Bohr, Albert, stop telling God what to do! 70
71 Intrinsic randomness Debate between Einstein and Bohr Born s rule introduces intrinsic randomness in quantum measurement. Important quantum feature that differs from classical procedures Heisenberg s uncertainty principle Witnessed by Bell s tests 71
72 Intrinsic randomness of a measurement For a given quantum state ρρ, what is the genuine randomness in a fixed projective measurement? Key question in quantum random number generation 72
73 Intrinsic randomness: pure state Pure state: ψψ = ii aa ii ii. Measurement basis: II = ii }, ii = 1, 2,, dd. Probability of obtaining the iith outcome: pp ii = aa ii 2 Define the measurement outcome as random variable A, the output randomness can be quantified by RR II ( ψψ ψψ ) = HH AA = pp ii log 2 pp ii = SS(ρρ diag ) where ρρ diag is the density matrix that has only diagonal terms of in the computational basis I. ii
74 Intrinsic randomness: mixed state For a general mixed state, the measurement outcome randomness is mixed with classical randomness. Examples: ρρ 1 = + +, + = 0 + 1, ρρ diag 2 1 = II ρρ 2 =, = 0 1, ρρ diag 2 2 = II ρρ 3 = , ρρ diag = II SS(ρρ diag ) is not a proper measure for intrinsic randomness
75 Intrinsic randomness: mixed state Measurement outcome of Alice: A System of Eve: ρρ EE Prediction of Eve: E
76 Classical and quantum adversaries (a) Classical adversary, the correlated party perform measurement individually on ρρ EE (b) Quantum adversary: the correlated party perform joint measurement on different runs of her system ρρ EE
77 Intrinsic randomness: classical adversary Yuan, Zhou, Cao, and Ma, PRA 92, (2015)
78 Intrinsic randomness: classical adversary Intrinsic randomness for general quantum states RR II ρρ = min pp ee RR II ( ψψ ee ) {pp ee, ψψ ee } ee where the minimum runs over all possible decompositions of ρρ. (C1) classical states generate no randomness; (C1 ) any non-classical states can always be used to generate intrinsic randomness. (C2a) classical operations should not increase the randomness of a given state; (C2b) requires that the randomness cannot increase on average when probabilistic strategies are considered. (C3) randomness cannot increase on average by statistically mixing several states. Intrinsic randomness RR II ρρ measures the strength of coherence.
79 Intrinsic randomness for qubit states Pure state ψψ = αα 0 + ββ 1 RR zz ( ψψ ) = HH( αα 2 ) = HH( ββ 2 ) nn xx = ψψ σσ xx ψψ = αα ββ + ββ αα, nn yy = ψψ σσ yy ψψ = iiαα ββ + iiββ αα 1+ 1 nn xx 2 nn2 yy RR zz ( ψψ ) = HH 2 Mixed state: similar method of deriving entanglement of formation. RR zz (ρρ) = HH nn xx 2 nn yy 2 2
80 Intrinsic randomness: quantum adversary ψψ AAAA is a purification of ρρ ρρ AAAA = ii pp ii ii ii ρρ EE SS AA EE = CC rel.ent. ρρ = SS ρρ diag SS ρρ Relative entropy measure of coherence CC rel.ent. ρρ = HH nn zz+1 2 HH nn
81 Intrinsic randomness: qubit example Given ρρ vv = vv vv II/2, RR zz (ρρ) = HH 1+ 1 vv2 CC rrrrrr.eeeeee. ρρ = 1 HH vv+1 2 In general, there is a non-zero gap between the two quantum randomness measures, RR zz ρρ CC rrrrrr.eeeeee. ρρ 2 Yuan, Zhao, Girolami, Ma, arxiv.org/abs/
82 Quantum Discord as Quantum Randomness gap The state after Alice s measurement is ρρ AAAA = pp ii ii ii ρρ EE ii For a state ρρ AAAA, the discord is defined as DD BB ρρ AAAA = min SS AA qq qq BB ii BB SS AA, BB ρρ ρρaaaa + SS BB ρρaaaa AAAA ii Then, it is easy to verify that RR zz ρρ CC rrrrrr.eeeeee. ρρ = DD EE ρρ AAEE
83 Thank you! Xiongfeng Ma: *Xiao Yuan, Zhen Zhang, Jiajun Ma Qi Zhao: Hongyi Zhou: You Zhou: Pei Zeng: 83
Practical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationEPR paradox, Bell inequality, etc.
EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationLecture 1: Introduction to Public key cryptography
Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationQuantum Cryptography
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationQuantum Entanglement Assisted Key Distribution
Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationQuantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More informationQuantum cryptography: from theory to practice
Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationLecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography
CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time
More informationEntanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen
Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can
More informationarxiv: v1 [quant-ph] 18 May 2018
Measurement-Device-Independent Quantum Secure Direct Communication, arxiv:1805.078v1 [quant-ph] 18 May 018 Zeng-Rong Zhou, 1,, 3, 4, 5, 6, Yu-Bo Sheng, 7, 8, 9, Peng-Hao Niu, 1,, 3, 4, 5, 6 Liu-Guo Yin,
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationNotes for Lecture 17
U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,
More informationDevice-Independent Quantum Information Processing (DIQIP)
Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationQuantum Cryptography
Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145
More informationHigh Fidelity to Low Weight. Daniel Gottesman Perimeter Institute
High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,
More informationPublic Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy
Symmetric Cryptography Review Alice Bob Public Key x e K (x) y d K (y) x K K Instructor: Dr. Wei (Lisa) Li Department of Computer Science, GSU Two properties of symmetric (secret-key) crypto-systems: The
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationAsymptotic Analysis of a Three State Quantum Cryptographic Protocol
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key
More informationClassical RSA algorithm
Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead
More informationThe Relativistic Quantum World
The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum
More informationPerfectly secure cipher system.
Perfectly secure cipher system Arindam Mitra Lakurdhi, Tikarhat Road, Burdwan 713102 India Abstract We present a perfectly secure cipher system based on the concept of fake bits which has never been used
More informationCyber Security in the Quantum Era
T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act
More informationKey distillation from quantum channels using two-way communication protocols
Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,
More informationSecrecy and the Quantum
Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationarxiv:quant-ph/ v1 6 Dec 2005
Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School
More informationUniversally composable and customizable post-processing for practical quantum key distribution
Title Universally composable and customizable post-processing for practical quantum key distribution Author(s) Ma, X; Fung, CHF; Boileau, JC; Chau, HF Citation Computers And Security, 2011, v. 30 n. 4,
More informationA. Quantum Key Distribution
A. Quantum Key Distribution The purpose of QKD is to establish a string of random bits (the key ) shared by Alice and Bob, where Alice and Bob can be highly confident that eavesdropper Eve knows almost
More information9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.
9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationarxiv:quant-ph/ v2 17 Sep 2002
Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationIntroduction to Cryptography. Lecture 8
Introduction to Cryptography Lecture 8 Benny Pinkas page 1 1 Groups we will use Multiplication modulo a prime number p (G, ) = ({1,2,,p-1}, ) E.g., Z 7* = ( {1,2,3,4,5,6}, ) Z p * Z N * Multiplication
More informationPublic-key Cryptography and elliptic curves
Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are
More informationUnconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi
More informationPublic-Key Cryptosystems CHAPTER 4
Public-Key Cryptosystems CHAPTER 4 Introduction How to distribute the cryptographic keys? Naïve Solution Naïve Solution Give every user P i a separate random key K ij to communicate with every P j. Disadvantage:
More informationChallenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley
Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying
More informationCryptography. P. Danziger. Transmit...Bob...
10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of
More informationQuantum Technologies: Threats & Solutions to Cybersecurity
Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile
More informationarxiv:quant-ph/ v2 3 Oct 2000
Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping
More informationCryptography CS 555. Topic 22: Number Theory/Public Key-Cryptography
Cryptography CS 555 Topic 22: Number Theory/Public Key-Cryptography 1 Exam Recap 2 Exam Recap Highest Average Score on Question Question 4: (Feistel Network with round function f(x) = 0 n ) Tougher Questions
More informationA semi-device-independent framework based on natural physical assumptions
AQIS 2017 4-8 September 2017 A semi-device-independent framework based on natural physical assumptions and its application to random number generation T. Van Himbeeck, E. Woodhead, N. Cerf, R. García-Patrón,
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationJohn Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography
John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the
More informationA probabilistic quantum key transfer protocol
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationC. QUANTUM INFORMATION 99
C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)
More informationHacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security
Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers
More informationDevice-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles
Device-independent Quantum Key Distribution and Randomness Generation Stefano Pironio Université Libre de Bruxelles Tropical QKD, Waterloo, June 14-17, 2010 Device-independent security proofs establish
More informationPractice Assignment 2 Discussion 24/02/ /02/2018
German University in Cairo Faculty of MET (CSEN 1001 Computer and Network Security Course) Dr. Amr El Mougy 1 RSA 1.1 RSA Encryption Practice Assignment 2 Discussion 24/02/2018-29/02/2018 Perform encryption
More informationTrustworthiness of detectors in quantum key distribution with untrusted detectors
Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,
More informationLecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography
Lecture 19: (Diffie-Hellman Key Exchange & ElGamal Encryption) Recall In private-key cryptography the secret-key sk is always established ahead of time The secrecy of the private-key cryptography relies
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationQuantum Communication
Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 7, 2015 CPSC 467, Lecture 11 1/37 Digital Signature Algorithms Signatures from commutative cryptosystems Signatures from
More informationQuantum key distribution
Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationBit-Commitment and Coin Flipping in a Device-Independent Setting
Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).
More informationDefinition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University
Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0
More informationQuantum Teleportation Pt. 3
Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation
More informationRIVF 2006 Tutorial. Prof. Patrick Bellot PhD. Dang Minh Dung. ENST (Paris) & IFI (Hanoi) RIVF 2006 Tutorial. "Quantum Communications"
4th IEEE International Conference RIVF 2006 - p. 1 ENST (Paris) & IFI (Hanoi) 4th IEEE International Conference RIVF 2006 - p. 2 Outline 1 2 3 4 5 4th IEEE International Conference RIVF 2006 - p. 3 The
More informationC. QUANTUM INFORMATION 111
C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i
More informationLecture 28: Public-key Cryptography. Public-key Cryptography
Lecture 28: Recall In private-key cryptography the secret-key sk is always established ahead of time The secrecy of the private-key cryptography relies on the fact that the adversary does not have access
More informationQuantum Entanglement and Cryptography. Deepthi Gopal, Caltech
+ Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationarxiv:quant-ph/ v3 13 Mar 2007
Quantum Cryptography: from Theory to Practice Hoi-Kwong Lo and Norbert Lütkenhaus Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical & Computer Engineering,
More information8 Elliptic Curve Cryptography
8 Elliptic Curve Cryptography 8.1 Elliptic Curves over a Finite Field For the purposes of cryptography, we want to consider an elliptic curve defined over a finite field F p = Z/pZ for p a prime. Given
More informationarxiv:quant-ph/ v2 7 Nov 2001
Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,
More informationUnitary evolution: this axiom governs how the state of the quantum system evolves in time.
CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the
More informationCPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems
CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory
More informationL7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015
L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm
More informationSeminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of
Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER
More informationCRYPTOGRAPHY AND NUMBER THEORY
CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We
More informationCryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups
Great Theoretical Ideas in CS V. Adamchik CS 15-251 Upcoming Interview? Lecture 24 Carnegie Mellon University Cryptography and RSA How the World's Smartest Company Selects the Most Creative Thinkers Groups
More informationOdd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi
Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initial state is completely known, the future can be predicted.
More informationCryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International
Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationIntroduction to Quantum Cryptography
Chapter 5 Introduction to Quantum Cryptography Xiaoqing Tan Additional information is available at the end of the chapter http://dx.doi.org/10.5772/56092 1. Introduction Broadly speaking, cryptography
More informationResearch Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract
Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement
More information