Introduction to Quantum Key Distribution

Similar documents
Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Ping Pong Protocol & Auto-compensation

Quantum key distribution for the lazy and careless

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Practical quantum-key. key- distribution post-processing

Quantum Technologies for Cryptography

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Secrecy and the Quantum

Perfectly secure cipher system.

Quantum Cryptography

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Cryptography in a quantum world

A probabilistic quantum key transfer protocol

Entanglement and information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum Cryptography and Security of Information Systems

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

arxiv:quant-ph/ v1 6 Dec 2005

Device-Independent Quantum Information Processing (DIQIP)

C. QUANTUM INFORMATION 111

Security Implications of Quantum Technologies

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

LECTURE NOTES ON Quantum Cryptography

Quantum sampling of mixed states

Transmitting and Hiding Quantum Information

Quantum Cryptography

Quantum Information Transfer and Processing Miloslav Dušek

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Cryptography

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Unconditionally secure deviceindependent

C. QUANTUM INFORMATION 99

Quantum Correlations as Necessary Precondition for Secure Communication

Security of Quantum Key Distribution with Imperfect Devices

10 - February, 2010 Jordan Myronuk

Quantum Cryptography. Marshall Roth March 9, 2007

Entropy Accumulation in Device-independent Protocols

Quantum Dense Coding and Quantum Teleportation

Information-theoretic treatment of tripartite systems and quantum channels. Patrick Coles Carnegie Mellon University Pittsburgh, PA USA

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Tutorial: Device-independent random number generation. Roger Colbeck University of York

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Research, Development and Simulation of Quantum Cryptographic Protocols

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 17 Sep 2002

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Quantum Cryptography

Entanglement and Quantum Teleportation

An Introduction to Quantum Information and Applications

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Quantum Cryptographic Network based on Quantum Memories. Abstract

arxiv:quant-ph/ v1 13 Jan 2003

1 1D Schrödinger equation: Particle in an infinite box

Quantum Key Distribution. The Starting Point

The BB84 cryptologic protocol

1 1D Schrödinger equation: Particle in an infinite box

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

A Matlab Realization of Shor s Quantum Factoring Algorithm

Lecture 2: Perfect Secrecy and its Limitations

Introduction to Quantum Information Hermann Kampermann

arxiv:quant-ph/ v2 11 Jan 2006

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Key distillation from quantum channels using two-way communication protocols

EPR paradox, Bell inequality, etc.

Device-Independent Quantum Information Processing

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

arxiv:quant-ph/ v2 2 Jan 2007

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Problem Set: TT Quantum Information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

arxiv: v7 [quant-ph] 20 Mar 2017

Quantum key distribution with 2-bit quantum codes

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Quantum Information Theory and Cryptography

arxiv:quant-ph/ v2 11 Jan 2006

Single and Entangled photons. Edward Pei

Quantum key distribution

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

The Relativistic Quantum World

Quantum Information Processing

Mobile Free Space Quantum Key Distribution for short distance secure communication

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Deterministic secure communications using two-mode squeezed states

APPLICATIONS. Quantum Communications

arxiv:quant-ph/ v1 13 Mar 2007

Quantum Teleportation Pt. 3

arxiv: v1 [quant-ph] 28 May 2011

Squashed entanglement

Optical Quantum Communication with Quantitative Advantage. Quantum Communication

Realization of B92 QKD protocol using id3100 Clavis 2 system

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Quantum Cryptography: A Short Historical overview and Recent Developments

Bell inequality for qunits with binary measurements

Introduction to Quantum Cryptography

Transcription:

Fakultät für Physik Ludwig-Maximilians-Universität München January 2010

Overview Introduction Security Proof

Introduction What is information? A mathematical concept describing knowledge. Basic unit is the bit 0 / 1. A physical concept 0 ˆ= and 1 ˆ=

Introduction What is information? A mathematical concept describing knowledge. Basic unit is the bit 0 / 1. A physical concept 0 ˆ= and 1 ˆ= The world is not made up of light switches, the world is made up of atoms and photons Atoms and photons are described by quantum mechanics The spin of an atom describes the information we have about it

Introduction spin- 1 2 system: points on the sphere unit of information is the quantum bit or qubit

Introduction spin- 1 2 system: points on the sphere unit of information is the quantum bit or qubit we can manipulate and transmit qubits ion trap optical fibre

Introduction Quantum Information Science Quantum Computation Shor s Factoring Algorithm Quantum Information Theory Quantum Communication Entanglement Quantum Cryptography Online Games Foundations of Quantum Mechanics Bell Inequalities

Alice und Bob want to communicate in secrecy, but their phone is tapped. Eve Alice phone Bob

Alice und Bob want to communicate in secrecy, but their phone is tapped. Eve Alice phone Bob If they share key (string of secret random numbers), Alice Eve Bob message +key -------------- cipher cipher - key -------------- message cipher is random and message secure (Vernam, 1926)

Alice und Bob want to communicate in secrecy, but their phone is tapped. Eve Alice phone Bob If they share key (string of secret random numbers), Alice Eve Bob 010 101 101 +101 110 001 ------------------- 111 011 100 111 011 100 +101 110 001 ------------------- 010 101 101 cipher is random and message secure (Vernam, 1926)

key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution

key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution possible key distribution schemes:

key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution possible key distribution schemes: Alice and Bob meet impractical

key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution possible key distribution schemes: Alice and Bob meet impractical Weaker level of security assumptions on speed of Eve s computer (public key cryptography) assumptions on size of Eve s harddrive (bounded storage model)

key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution possible key distribution schemes: Alice and Bob meet impractical Weaker level of security assumptions on speed of Eve s computer (public key cryptography) assumptions on size of Eve s harddrive (bounded storage model) Use quantum mechanical effects (Bennett & Brassard 1984, Ekert 1991)

prepare & measure (Wiesner 1970 s, Bennett & Brassard 1984) Eve Alice glass fibre phone Bob

prepare & measure (Wiesner 1970 s, Bennett & Brassard 1984) Eve Alice glass fibre phone Bob Security guaranteed by uncertainty principle Alice sends eigenstates of σ z or σ x. Bob measures observable σ z or σ x. They tell each other the observable, but not the result. They should obtain the same result when they used the same observable key If Eve measures in the wrong observable, they have an error with probability 1 2, since [σ z, σ x ] 0.

entanglement-based (Ekert 1991) Eve 0 0 1 1 Alice glass fibre phone Bob

entanglement-based (Ekert 1991) Eve 0 0 1 1 Alice glass fibre phone Bob Security guaranteed by monogamy of entanglement Alice and Bob check (Bell inequality): ψ ABE? = 1 2 ( 0 A 0 B + 1 A 1 B ) φ E. If YES: Eve does not know their measurement results. Results are random key If NO: they abort the protocol.

Entangled state of two qubits 1 2 ( 0 A 0 B + 1 A 1 B )

Entangled state of two qubits 1 2 ( 0 A 0 B + 1 A 1 B ) New basis + = 1 ( 0 + 1 ) = 1 ( 0 1 ) 2 2 easy calculation 1 ( 0 A 0 B + 1 A 1 B ) = 1 ( + A + B + A B ) 2 2

Entangled state of two qubits 1 2 ( 0 A 0 B + 1 A 1 B ) New basis + = 1 ( 0 + 1 ) = 1 ( 0 1 ) 2 2 easy calculation 1 ( 0 A 0 B + 1 A 1 B ) = 1 ( + A + B + A B ) 2 2 If Alice and Bob measure observable σ z same result If Alice and Bob measure observable σ x same result

Entangled state of two qubits 1 2 ( 0 A 0 B + 1 A 1 B ) New basis + = 1 ( 0 + 1 ) = 1 ( 0 1 ) 2 2 easy calculation 1 ( 0 A 0 B + 1 A 1 B ) = 1 ( + A + B + A B ) 2 2 If Alice and Bob measure observable σ z same result If Alice and Bob measure observable σ x same result Converse is true, too: same measurement result they have state 1 2 ( 0 A 0 B + 1 A 1 B ) Alice and Bob can test whether or not they have the state 1 2 ( 0 A 0 B + 1 A 1 B )!

Assume that Alice and Bob have the state φ AB = 1 2 ( 0 A 0 B + 1 A 1 B ) and measure in the same basis. Can someone else guess the result?

Assume that Alice and Bob have the state φ AB = 1 2 ( 0 A 0 B + 1 A 1 B ) and measure in the same basis. Can someone else guess the result? No! The measurement result is secure! Total state of Alice, Bob and Eve ψ ABE = φ AB φ E, because Alice and Bob have a pure state Eve is not at all correlated with Alice and Bob! Monogamy of entanglement Try: ψ ABE = 1 2 ( 0 A 0 B 0 E + 1 A 1 B 1 E ) ρ AB = 1 2 ( 0 A 0 B 0 A 0 B + 1 A 1 B 1 A 1 B ) different from φ φ AB = 1 2 ( 0 A 0 B 0 A 0 B + 1 A 1 B 0 A 0 B + 0 A 0 B 1 A 1 B + 1 A 1 B 1 A 1 B )

The Protocol Distribution Eve 1 Alice glass fibre 1 1 Bob

The Protocol Distribution Eve Alice 1 2 glass fibre 1 2 1 2 Bob

The Protocol Distribution Eve Alice 1 2 n Bob glass fibre 1 2 n 1 2 n

The Protocol Distribution Eve Alice 1 2 n Bob glass fibre 1 2 n 1 2 n Measurement with σ x or σ z 0 1 1 0 0 1

The Protocol Distribution Eve Alice 1 2 n Bob glass fibre 1 2 n 1 2 n Measurement with σ x or σ z 0 1 1 0 0 1 Error-free? φ AB? = 1 2 ( 0 A 0 B + 1 A 1 B ) phone

The Protocol Distribution Eve Alice 1 2 n Bob glass fibre 1 2 n 1 2 n Measurement with σ x or σ z 0 1 1 0 0 1 Error-free? φ AB? = 1 2 ( 0 A 0 B + 1 A 1 B ) phone If YES: key. If NO: no key

entanglement key key perfectly secure communication not possible with classical physics future (quantum) technology!

Security Proof The Protocol Distribution Eve Alice 1 2 n Bob glass fibre 1 2 n 1 2 n Measurement with σ x or σ z 0 1 1 0 0 1 Error-free? φ AB? = 1 2 ( 0 A 0 B + 1 A 1 B ) phone If YES: key. If NO: no key

Security Proof Honest Eve would distribute Ψ n ABC = ψ n ABE bits are independent ψ ABE = φ AB φ E Eve knows nothing φ AB = 1 ( 0 A 0 B + 1 A 1 B ) bits are random 2 Alice and Bob need to test whether Eve is honest or not.

Security Proof If Eve sends states of the form Ψ n ABC = ψ n ABE Alice and Bob test (on a subset): Are the pairs are of the form φ AB = 1 2 ( 0 A 0 B + 1 A 1 B ) i.e. is the data error-free? If YES, standard statistical analysis implies (almost) all remaining triples are of the form φ AB φ E resulting bits are (almost) identical and random Eve has (almost) no information about bits Alice and Bob perform error correction Alice and Bob delete a few random bits Eve has no information about remaining bits (privacy amplification) key If NO, abort the protocol

Security Proof The Protocol Distribution Ψ n ABC = ψ n ABE Measurement Alice Eve 1 2 n Bob 1 2 n 1 2 n 0 1 1 0 0 1 compare subset Error Estimation φ AB? = 1 2 ( 0 A 0 B + 1 A 1 B ) NO: Abort protocol YES: error correction & privacy amplification 1 0 1 1 0 1

Security Proof Proof works as long as Ψ n ABC = ψ n ABE. Alice Bob But why should Eve prepare such a state? Why not the following? Alice Bob

Security Proof De Finetti Theorem (Diaconis and Freedman, 1980) Drawing balls from an urn with or without replacement results in almost the same probability distribution. If k are drawn out of n, then P k i p i Q k i 1 const k n.

Security Proof Quantum generalisations have been obtained by Størmer, Hudson & Moody, and Werner et al.. (n = ) Quantum De Finetti Theorem Ch., König, Mitchison, Renner, Comm. Math. Phys. 273, 473498 (2007) Let ρ n be a permutation-invariant state πρπ 1 = ρ, then ρ k i p i σ k i 1 const k n const = 4d 2 d dependence is necessary classically, k 2 /n bound exists

Security Proof Proof sketch reduce problem to the Bosonic case πρ = ρ, for all π S n ρ lives on Sym n (C d ) Sym k (C d ) Sym n k (C d ) measurement with SU(d) coherent states φ n = φ k φ n k post-measurement on k particles: ρ k post = µ(φ) φ φ k gentle measurement ρ k ρ k post (error k/n). generalises to arbitrary irreducible representations of SU(d).

Security Proof Alice and Bob select a random sample of pairs (after pairs have been distributed!) Alice Bob Alice Quantum de Finetti Bob can use proof from before (tensor product) proof of the security of!

Security Proof Closer look: deviation from perfect key (due to quantum de Finetti theorem) ɛ k/n n: number of pairs that Eve distributed k: number of bits of key

Security Proof Closer look: deviation from perfect key (due to quantum de Finetti theorem) ɛ k/n n: number of pairs that Eve distributed k: number of bits of key key rate r k/n ɛ 0 not good enough need replacement for de Finetti theorem Renner s exp. de Finetti theorem, involved, non-optimal

Security Proof Post-selection Technique Ch., König, Renner, Phys. Rev. Lett. 102, 020504 (2009) Idea: Compare actual protocol with an ideal protocol (which produces perfect key) Theorem about permutation-covariant maps, rather than permutation-invariant states.

Security Proof Post-selection Technique Ch., König, Renner, Phys. Rev. Lett. 102, 020504 (2009) Idea: Compare actual protocol with an ideal protocol (which produces perfect key) Theorem about permutation-covariant maps, rather than permutation-invariant states. In QKD: r k/n 1 δ and ɛ exp( δ 2 n) optimal parameters relevant in current experiments (since n 10 5 ) Eve s best attack Ψ n ABE = ψ ABE n conceptual and technical simplification of security proofs Other applications: Quantum Reverse Shannon Theorem Berta, Ch. and Renner, arxiv:0912.3805