Quantum Information Transfer and Processing Miloslav Dušek

Similar documents
Linear-optical quantum information processing: A few experiments

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Device-Independent Quantum Information Processing

Practical aspects of QKD security

Device-Independent Quantum Information Processing (DIQIP)

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Advanced Cryptography Quantum Algorithms Christophe Petit

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum Cryptography

Quantum Information Processing and Diagrams of States

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

LECTURE NOTES ON Quantum Cryptography

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

Cyber Security in the Quantum Era

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum key distribution for the lazy and careless

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Quantum Cryptography

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum key distribution

Security and implementation of differential phase shift quantum key distribution systems

Security Implications of Quantum Technologies

Cryptography in a quantum world

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

arxiv:quant-ph/ v1 26 Mar 2001

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum Key Distribution. The Starting Point

Applications of Quantum Key Distribution (QKD)

Quantum Cryptography and Security of Information Systems

Ping Pong Protocol & Auto-compensation

Quantum Technologies for Cryptography

National Institute of Standards and Technology Gaithersburg, MD, USA

Quantum Cryptography

Security of Quantum Key Distribution with Imperfect Devices

Practical Quantum Key Distribution

Quantum Cryptography. Marshall Roth March 9, 2007

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

An Introduction to Quantum Information and Applications

An entangled LED driven quantum relay over 1km

Entanglement and information

Content of the lectures

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin

Introduction to Quantum Key Distribution

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

C. QUANTUM INFORMATION 99

Quantum Information Processing

Quantum Communication. Serge Massar Université Libre de Bruxelles

C. QUANTUM INFORMATION 111

Problem Set: TT Quantum Information

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

A. Quantum Key Distribution

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Technical Report Communicating Secret Information Without Secret Messages

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

Research, Development and Simulation of Quantum Cryptographic Protocols

PROGRESS IN OPTICS VOLUME 4 9. E. Wolf

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Secrets of Quantum Information Science

Quantum Dense Coding and Quantum Teleportation

A semi-device-independent framework based on natural physical assumptions

A central problem in cryptography: the key distribution problem.

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Quantum Cryptography

Labs 3-4: Single-photon Source

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

arxiv:quant-ph/ v1 13 Mar 2007

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

Quantum information processing using linear optics

Quantum Cryptographic Network based on Quantum Memories. Abstract

arxiv:quant-ph/ v1 6 Dec 2005

Quantum Communication

Differential Phase Shift Quantum Key Distribution and Beyond

Secrecy and the Quantum

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Quantum Wireless Sensor Networks

Practical quantum-key. key- distribution post-processing

Title Experimental long-distance quantum secure direct communication

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Perfectly secure cipher system.

Quantum Cryptography: A Short Historical overview and Recent Developments

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Quantum Gates, Circuits & Teleportation

Quantum threat...and quantum solutions

EPR paradox, Bell inequality, etc.

High rate quantum cryptography with untrusted relay: Theory and experiment

Universal Single Server Blind Quantum Computation Revisited

Chapter 5. Quantum Cryptography

Ground-Satellite QKD Through Free Space. Steven Taylor

Communications Quantiques

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Transcription:

Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc

Quantum theory

Quantum theory At the beginning of 20 th century about the same time as the theory of relativity one of the most extraordinary physical theories was born. The most precisely experimentally verified theory. Many practical applications: Semiconductor components, Lasers, Nuclear energy, New materials, etc. It has completely changed the paradigm in physics. We know quantum theory for about 100 years but we still do not understand it as deeply as we would like.

Quantum theory For description of Nature we need quantum theory. But it has many strange and counterintuitive features: Some quantities cannot be exactly measured (repeated measurements on exact replicas of the system lead to different results) intrinsic randomness (not ignorance). In general, measurement substantially changes the state of the measured system. Existence of correlations between distant particles which are stronger than any classical correlations (violation of Bell inequalities) entanglement, quantum non-locality.

Quantum theory Entanglement has no classical counterpart. Entanglement is a trick that quantum magicians use to produce phenomena that cannot be imitated by classical magicians. Asher Peres

Quantum physics and information processing Quantum effects offer solutions to some tasks which cannot be solved in classical information theory (secure distribution of cryptographic key) or whose classical solution is unknown (factorization of large numbers in polynomial time and other hard computational problems). Information processing is always physical what we can do with information depends on the physical system which carries it. Quantum systems behave more strangely than classical ones.

Quantum information science It joins quantum physics and information theory. Information theory based on quantum principles extends and completes classical information theory, somewhat as complex numbers extend and complete the reals. C. H. Bennett Classical bit: 0 or 1 Quantum bit (qubit): 0 1 Quantum register superposition of states of the whole register (entangled state; dimension of the state space grows exponentially with the number of qubits) 1 2 00 11

Quantum information science applications Quantum cryptography Secret communication: Security does not depend on the computational or technological power of the adversary, but it is guarantied by the laws of physics. Secure key distribution eavesdropping can be detected. Quantum computation Evolution of quantum system performs computation. Efficient (polynomial) algorithms exist for factorization, discrete logarithm; fast database search, etc. Threat for classical cryptosystems.

Quantum information science applications

Quantum key distribution Quantum physics solves the problem of the distribution of cryptographic keys. Information in encoded into non-orthogonal states of quantum systems (e.g. photons). Eavesdropping = Interaction with the physical entity carrying information (e.g. measurement). Any interaction with a quantum system which can lead to information leakage disturbs its state in general. Eavesdropping can be detected. If eavesdropping is detected the key is not used.

Quantum key distribution BB84

Quantum key distribution BB84 G. Brassard C.H. Bennett

Privacy amplification In any real apparatus, there is noise which causes errors. Therefore, some small amount of errors have to be tolerated. Nevertheless, to be on the safe side we have to suppose that all the errors are due to eavesdropping. Error correction can be applied (but another information leaks). The maximal information, that could leak out to Eve, can be estimated from the error rate. Privacy amplification procedure can be applied to the key. This procedure decreases Eve's information at the cost of shortening the key.

Limitation on distance The maximal distance over which secure QKD can be established decreases with increasing losses and increasing detector noise. Detection rate decreases with increasing distance due to losses. When the detection rate is comparable with the detector noise secure QKD is impossible. Standard amplifiers cannot be used they would affect the states of photons in a similar way as eavesdropping. Present-day technology allows secure operation up to about 150 km in fibers. Solution: Quantum repeaters (based on entanglement swapping and quantum memories).

Authentication In QKD it is necessary to authenticate classical communication between Alice and Bob. Bob must be sure that messages come from Alice and vice-versa. Therefore at the beginning Alice and Bob must share some small amount of secret information for authentication. Using this authentication information they can create any amount of shared secure key by means of QKD. QKD is a key expansion protocol (not possible in classical cryptography).

Other protocols Continuous variable QKD: Security is not based on the use of single particles (it is based on the use of nonorthogonal states). There are QKD protocols using so called continuous variables, too. The corresponding measurement schemes are based on optical homodyne detection and involve measurement of real amplitudes instead of discrete events. Entanglement based QKD: Alice has one and Bob has the other particle from an entangled quantum pair. The first entanglement-based protocol was proposed in 1991 by A. Ekert. Security is ensured by checking the violation of Bell inequalities. A simplified version of the protocol works in a very similar way as BB84.

Hacking QKD QKD is provably secure if quantum theory is true. But real devices use imperfect components. These imperfections can be exploited by eavesdroppers. In these cases, an eavesdropper doesn t need to perform a full quantum attack. She can either read information from side channels or manipulate detection system (or other systems) of the device. Side channel attacks are well known also in classical cryptography.

Hacking QKD Some of possible attacks are: Reading the setting using reflection of a strong pulse. Getting information on the results from detector back flashes. Controlling single-photon APD detectors by bright light. Bright illumination is used to blind the detector, then if another bright pulse is applied above a classical sensitivity threshold the detector clicks controllably. Exploiting difference in timing of detector gates (in gated mode). Eavesdropper can exploit even a small difference and send precisely timed faked states which force only the desired detector to click.

Untrusted devices Usually, in security proofs it is supposed that one knows what his device really do, but it needn't be true, e.g., for commercial devices. Entanglement based protocols offer a possibility of blackbox security. If Alice and Bob observe correlations that violate a Bell inequality it is enough to guarantee entanglement (and security), independently of the nature of the quantum signals and even of the measurements that are performed on them.

Untrusted devices Limitations: Random number generator cannot be within the black box it must be trusted. One must also make sure that no output port is diffusing the key outside. Problem: Detection loophole (to be sure that the Bell inequality is violated detector efficiencies must be above 82.8%). Theoretical possibility of provable security with untrusted devices.

The first QKD experiment Bennett, Bessette, Brassard, Salvail, Smolin,1989 Polarization encoding, free space (32 cm)

Commercial QKD systems ID Quantique MagiQ Toshiba Research Europe, NEC Corporation,

Free-space communication 144 km from La Palma to Tenerife

Free-space communication Future: Earth-satellite, satellite-satellite

Technology Single photon sources: Spontaneous parametric down conversion Color centers in diamond Quantum dots Single atoms and molecules Entangled photon sources: Spontaneous parametric down conversion Quantum dots

Technology Single photon detectors: Avalanche photodiodes (Si): = 600 nm, = 50%, p d =100 s -1, f count =15 MHz, T = 250 K, photon number no Avalanche photodiodes (InGaAs): =1550 nm, = 10%, p d =10-5 per gate, f count =100 khz, T=220 K, photon number no Self-differencing APD: f count =100 MHz Visible Light Photon Counters = 600 nm, > 70%, p d =20000 s -1, f count = 15 khz, T = 6 K, photon number yes Superconducting Single Photon Detectors = 1550 nm, < 10%, p d = 0.01 s -1, f count = 1 GHz, T = 2.5 K, photon number no Transition Edge Sensors = 1550 nm, = 65%, p d = 0.001 s -1, f count = 10 khz, T = 0.1 K, photon number yes

Quantum computing Efficient algorithms for factorization, discrete logarithm, etc. Number of elementary operations grows with the input length at most as a polynomial of a finite degree. Can exploit: Quantum correction codes, Preparation of complex entangled states, Quantum teleportation, etc. To built quantum circuits we need quantum gates (analogous to classical logical gates) Qubits in quantum gates must interact with each other in a controlled way but must not interact with the environment (in order to keep superpositions) This is a difficult task. Many platforms are investigated: Trapped ions, Atoms in a cavity, Electrons in a quantum dot, Superconducting junctions, Light, etc.

Linear-optical quantum information processing Linear-optical gates are experimentally feasible. They work directly with photons without necessity to transfer the quantum state of a photonic qubit into another quantum system like an ion etc. (photons are good carriers of quantum information for communication purposes). Linear-optical quantum gates achieve the non-linearity (required for interaction between qubits) by means of quantum measurement (quantum measurement is nonlinear - it breaks superpositions). After the measurement on an auxiliary system the state of the whole system collapses.

Programmable gate for an arbitrary rotation of a single qubit along the z axis M. Mičuda, M. Ježek, M. Dušek, J. Fiurášek, Phys. Rev. A 78, 062311 (2008) It applies a unitary phase shift to a data qubit. The value of the phase shift is determined by the state of a program qubit. [G. Vidal et al., Phys. Rev. Lett. 88, 047905 (2002)] An exact specification of the phase shift would require infinitely many classical bits. Here, the information is encoded into a single qubit. Photon pairs at 814 nm: SPDC in LiIO 3, cw pump (CUBE) Polarization encoding is used

Optimal controlled phase gate with an arbitrary phase shift K. Lemr, A. Černoch, J. Soubusta, K. Kieling, J. Eisert, M. Dušek, Phys. Rev. Lett. 106, 013602 (2011) The phase shift can be tuned to any given value. [K. Kieling, J.L. O'Brien, J. Eisert, New J. Phys. 12, 13003 (2010)] 0, 0 0, 0 0, 1 0, 1 1, 0 1, 0 i 1, 1 e 1, 1 Bulk optical elements Polarization encoding of qubit states

Thank you for your attention I'm rather delighted that we must resort to such peculiar rules and strange reasoning to understand Nature, and I enjoy telling people about it. Richard P. Feynman