Quantum Communication. Serge Massar Université Libre de Bruxelles

Similar documents
Problem Set: TT Quantum Information

Quantum Communication

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Ping Pong Protocol & Auto-compensation

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information and Applications

LECTURE NOTES ON Quantum Cryptography

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Entanglement and Quantum Teleportation

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

A Superluminal communication solution based on Four-photon entanglement

1 1D Schrödinger equation: Particle in an infinite box

EPR paradox, Bell inequality, etc.

Secrets of Quantum Information Science

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Cryptography

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin

Introduction to Quantum Cryptography

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Lecture 20: Bell inequalities and nonlocality

Quantum sampling of mixed states

1 1D Schrödinger equation: Particle in an infinite box

Quantum Dense Coding and Quantum Teleportation

Technical Report Communicating Secret Information Without Secret Messages

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Non-locality and Communication Complexity

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Title Experimental long-distance quantum secure direct communication

Quantum Information & Quantum Computation

Quantum Teleportation Pt. 3

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Instantaneous Nonlocal Measurements

Device-Independent Quantum Information Processing (DIQIP)

The Relativistic Quantum World

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Transmitting and Hiding Quantum Information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Quantum Teleportation Pt. 1

Security and implementation of differential phase shift quantum key distribution systems

Quantum Teleportation with Photons. Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997).

Labs 3-4: Single-photon Source

SUPPLEMENTARY INFORMATION

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

A central problem in cryptography: the key distribution problem.

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Quantum Repeaters and Memories

Seminar 1. Introduction to Quantum Computing

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Communication

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Entanglement and information

Device-Independent Quantum Information Processing

The Conversion Revolution: Down, Up and Sideways

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Computing 1. Multi-Qubit System. Goutam Biswas. Lect 2

Differential Phase Shift Quantum Key Distribution and Beyond

Ground-Satellite QKD Through Free Space. Steven Taylor

Cryptography in a quantum world

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Multiparty Quantum Remote Control

Quantum Information Processing

Security Implications of Quantum Technologies

Quantum information and quantum computing

Quantum key distribution

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Experimental realization of quantum cryptography communication in free space

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Quantum Cryptography

arxiv: v2 [quant-ph] 21 Oct 2013

Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions

Practical Quantum Key Distribution

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Lecture: Quantum Information

Quantum entanglement and macroscopic quantum superpositions

Experimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević

Realization of B92 QKD protocol using id3100 Clavis 2 system

Entanglement distillation between solid-state quantum network nodes

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

SQL injection principle against BB84 protocol

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume

Quantum Interference of Unpolarized Single Photons

Introduction to Quantum Computing

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

Quantum Cryptography

Quantum Key Distribution. The Starting Point

arxiv:quant-ph/ v1 2 Oct 1997

Quantum non-demolition measurements:

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

arxiv: v7 [quant-ph] 20 Mar 2017

EXPERIMENTAL IMPLEMENTATION OF HIGHER DIMENSIONAL ENTANGLEMENT NG TIEN TJUEN

Transcription:

Quantum Communication Serge Massar Université Libre de Bruxelles

Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what? Talk: Theoretical Concepts & Illustrative Experiments

Quantum Communication Why? How?

Quantum Communication Why? Quantum Crypto Q. Key Distribution Other protocols Coin Tossing, etc Communication Complexity Foundations of Physics How?

Quantum Communication Why? Quantum Crypto Q. Key Distribution Other protocols Coin Tossing, etc Communication Complexity Foundations of Physics How? Photons ω E( x, t) = Aucos t k. x ϕ u Polarization ω, t Frequency/Energy k, x Momentum/Position A, ϕ Amplitude/Phase Wavelength Visible: Free Space Near IR: fiber optics λ 1.5μm

Protocols in which a single qubit is Prepared Sent Measured ALICE 0 U ψ BOB Quantum Key Distribution

Quantum Key Distribution Alice Eve Bob Alice and Bob want to share a secret key rrr... r { 0,1}... 1 2 3 N 1 2 3 N rrr r

Quantum Key Distribution Alice Eve Bob Alice and Bob want to share a secret key rrr... r { 0,1}... 1 2 3 N 1 2 3 N rrr r Eve should not learn the key If Eve tries to learn the key, she is detected

Quantum Key Distribution Alice Eve Bob Alice and Bob want to share a secret key rrr... r { 0,1}... 1 2 3 N 1 2 3 N rrr Eve should not learn the key If Eve tries to learn the key, she is detected r Use quantum communication & uncertainty principle / no cloning theorem

QKD If Alice prepares: two orthogonal states If Bob measures: in basis i 0 e ϕ i Send to Bob ± 1 0 ± e ϕ 1 Then Bob learns which state was prepared by Alice

!!!But Eve can also learn the state by Measuring in same basis!!! QKD If Alice prepares: two orthogonal states If Bob measures: in basis i 0 e ϕ i Send to Bob ± 1 0 ± e ϕ 1 Then Bob learns which state was prepared by Alice

QKD: Trick Alice randomly prepares Bob randomly measures in bit=0,1 0 ± 1 bit=0,1 0 ± i 1 Send to Bob 0 ± 1 0 basis 0 ± i 1 90 basis Now Eve is stymied. In which basis to measure?!!if she learns information, she disturbs the state!!

QKD: Trick Alice randomly prepares Bob randomly measures in bit=0,1 0 ± 1 bit=0,1 0 ± i 1 Send to Bob 0 ± 1 0 basis 0 ± i 1 90 basis Now Eve is stymied. In which basis to measure?!!if she learns information, she disturbs the state!! Alice and Bob can obtain a secret key by revealing publicly at a later stage the basis used. If the basis are the same, the prepared and measured state constitute the secret key.

QKD: Example Emission φ 0 90 180 90 0 270 180 0 90 Bit Sent 0 0 1 0 0 1 1 0 0 Mst Basis 90 90 0 90 0 0 0 90 0 Mst Result 1 0 1 0 0 1 1 1 0 Key X 0 1 0 0 X 1 X X

QKD needs single photon states In practice: Attenuated coherent states «The poor man s single photon source» α 2 α n 2 α α 2 = e n 1 0 + α 1 +... n n! 2

First QKD Experiment Propagation distance: 30cm Key rate 1 bit/s Journal of Cryptology 5, 3-28 (1992)

Quantum Cryptography Today Key distribution over 50km of optical fiber Secret key rate: 1Mbit/s Continuous operation for 36hours Technique used: time bins A. R. Dixon et al., Applied Physics Letters, 96, 161102 (2010)

Experiments with entangled photons ALICE BOB 1 φ + = d k k A k B

Experiments with entangled photons ALICE BOB Why? 1 φ + = k d Q. Comm. Over longer distances: Slightly further than prepare and measure schemes First step towards quantum repeaters Fundamental test of Nature: Quantum Non Locality Device Independent Quantum Cryptography k A k B

Non Locality: Aspect type experiment X Input =Measurement Settings Y Alice Bob D φ A φ B D D D a Output=Measurement Outcomes b P(ab XY) = P(A outcome & B outcome A mst setting & B mst setting)

Implications of Non Locality Local Hidden Variable Model Pab ( xy) = dλp( λ) Pa ( xλ) Pb ( yλ) If a lhv description is possible, P(ab xy) satisfies all Bell inequalities local deterministic description of measurements is possible If lhv description is impossible: (Quantum) Non Locality measurements results are random, must be secret detected by Bell inequality violation

Experiments with entangled particles Equivalence with remote state preparation Equivalence with prepare and measure

Equivalences between schemes u i v j i j U V φ + = 0 0 + 1 1 j (Random) remote state preparation v j V u i i U T (Random) Prepare and measure scheme

Entangled Photon source Frequency Doubling ω 2ω Parametric Down Conversion ω 1 2ω ω 2 ω 1 + ω 2 = 2ω : Energy Conservation (approximate) Momentum Conservation (Phase Matching Condition)

Frequency Entanglement bpf D Laser PPLN ~Ω bβ ψ = dωf( ω) ω + ω ω ω 0 0 aα bpf D Normalised Coincidence rate 0 1 0 Relative phase 2π

Nature Physics 3, 481-486 (2007) 35 coincidences / s

Quantum Teleportation Bell Measurement ± φ ψ ± = 0 0 ± 1 1 = 0 1 ± 0 1 r ψ Ur ψ φ + = 0 0 + 1 1

Entanglement Swapping φ + = 0 0 + 1 1 A D A D Bell Measurement ± φ ψ ± = 0 0 ± 1 1 B C B C = 0 1 ± 0 1 B C B C r Ur φ + = 0 0 + 1 1 φ + = 0 0 + 1 1 A B A B C D C D

Bell State Measurement with Photons a 1 a 2 D ( ab ab ab ab ) ψ = α + β + γ + δ 1 1 2 1 1 2 2 2 0 Two photons Two modes in beam a Two modes in beam b b 1 b 2 D Coincident detection in both detectors implies that initial state was 1 1 ψ = ab 1 2 ab 2 1 0 2 2 With probability 1/4 one measures a Bell sta

Experimental Quantum Teleportation. Telecomunication Wavelengths distance 55m, passing through a spool of 2km optical fiber Nature 421, 509-513 (2003)

Quantum Communication with atoms and photons. Entanglement of two Yb+ ions Situated in 2 separate vacuum chambers separated by 1m 1 event every 10 minutes Advantages: Information can be stored Interfacable with quantum computer Detection loophole closed.

Quantum Communication with atoms and photons. Entanglement of two Yb+ ions Situated in 2 separate vacuum chambers separated by 1m 1 event every 10 minutes Advantages: Information can be stored Interfacable with quantum computer Detection loophole closed. Nature 449, 68-71 (2007)

Quantum Communication Complexity input x input y ALICE PRIOR RESOURCE COMMUNICATION BOB ouput f(x,y) TASK:Minimum Communication to provide the correct output

Quantum Communication Complexity input x PRIOR RESOURCE Shared Randomness Entanglement input y ALICE ouput f(x,y) COMMUNICATION Cbits Qbits BOB TASK:Minimum Communication to provide the correct output

Example: Equality Input x ALICE { } 0,1 n Output x = y or x y PRIOR RESOURCE Shared Randomness Entanglement COMMUNICATION Cbits Qbits Input y { } BOB 0,1 n

Example: Equality Input x { } 0,1 n PRIOR RESOURCE Shared Randomness Entanglement Input y { } 0,1 n ALICE BOB Output x = y or x y COMMUNICATION Cbits Qbits No Error: n cbits of communication required Small Error probability & shared randomness Log(n) cbits of communication required Deutsch-Jozsa setting: either x=y or x differs from y in exactly n/2 positions O(0.007n) cbits required Log(n) qubits required Log(n) ebits + Log(n) cbits

Example: Sum mod 2π PROMISE θ = 0 or π (mod 2 π) i i θ 1 θ 2 θ 3 θ n A1 A2 A3 An Question: is θ = 0 or π (mod 2 π) i i PRIOR RESOURCES COMMUNICATION Bounded Error: requires O(n Log(n)) cbits n qubits 1GHZ state + n cbits

Experimental Realisation of Sum mod 2π PRA 72, 050305R 2005

Faster Conclusion The future of Quantum Better detectors Further Via satellite (?) Repeaters Communication Interfacing with stationary qubits Quantum memories for light Error Correction