arxiv:quant-ph/ v2 3 Oct 2000

Similar documents
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v2 2 Jan 2007

Quantum Teleportation. Gur Yaari for HEisenberg's Seminar on Quantum Optics

arxiv:quant-ph/ v1 27 Dec 2004

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

arxiv:quant-ph/ v1 6 Dec 2005

Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs

Perfectly secure cipher system.

Quantum key distribution with 2-bit quantum codes

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Entanglement and information

Technical Report Communicating Secret Information Without Secret Messages

arxiv:quant-ph/ v1 14 Jun 1999

Optik 122 (2011) Contents lists available at ScienceDirect. Optik. journal homepage:

Entanglement of projection and a new class of quantum erasers

10 - February, 2010 Jordan Myronuk

arxiv:quant-ph/ v1 2 Oct 1997

Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states

Quantum Entanglement Assisted Key Distribution

Quantum Cryptography and Security of Information Systems

Multiparty Quantum Remote Control

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Teleportation of a Zero- and One-photon Running Wave State by Projection Synthesis

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v2 11 Jan 2006

Quantum Cryptography

Security Implications of Quantum Technologies

arxiv: v1 [quant-ph] 18 May 2018

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Quantum Dense Coding and Quantum Teleportation

Quantum Cryptography

Quantum Optical Implementation of Quantum Communication

Quantum secret sharing based on quantum error-correcting codes

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 4 Mar 2005

Quantum Cryptography

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c

CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES

arxiv:quant-ph/ v2 7 Nov 2001

Transmitting and Hiding Quantum Information

Quantum Cryptographic Network based on Quantum Memories. Abstract

Quantum Cryptography: A Short Historical overview and Recent Developments

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties

Teleportation of a two-atom entangled state via cavity decay

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

A Bell Theorem Without Inequalities for Two Particles, Using Efficient Detectors. Daniel M. Greenberger City College of New York, New York, NY 10031

Efficient Quantum Key Distribution. Abstract

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Trustworthiness of detectors in quantum key distribution with untrusted detectors

example: e.g. electron spin in a field: on the Bloch sphere: this is a rotation around the equator with Larmor precession frequency ω

Quantum error correction in the presence of spontaneous emission

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

Quantum Teleportation Pt. 3

Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Teleportation: Dream or Reality?

A single quantum cannot be teleported

Introduction to Quantum Key Distribution

Quantum secure direct communication with quantum. memory

Deterministic secure communications using two-mode squeezed states

A Superluminal communication solution based on Four-photon entanglement

Quantum key distribution for the lazy and careless

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

EPR paradox, Bell inequality, etc.

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

A PRACTICAL TROJAN HORSE FOR BELL-INEQUALITY- BASED QUANTUM CRYPTOGRAPHY

arxiv:quant-ph/ Jan 2000

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

arxiv:quant-ph/ v2 17 Mar 2003

arxiv: v2 [quant-ph] 9 Nov 2011

The P versus NP Problem in Quantum Physics

Realization of B92 QKD protocol using id3100 Clavis 2 system

Cryptography in a quantum world

Quantum Cryptography. Marshall Roth March 9, 2007

Bell inequality for qunits with binary measurements

The BB84 cryptologic protocol

arxiv: v3 [quant-ph] 19 Jun 2017

A. Quantum Key Distribution

arxiv:quant-ph/ v3 11 Mar 2004

An arbitrated quantum signature scheme

Research, Development and Simulation of Quantum Cryptographic Protocols

Linear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state

A probabilistic quantum key transfer protocol

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION

Circular Semi-Quantum Secret Sharing Using Single Particles

arxiv:quant-ph/ v1 28 Jul 2000

Transcription:

Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping between Einstein-Podolsky-Rosen EPR pairs can be used to generate the same sequence of random bits in two remote places A quantum key distribution protocol based on this idea is described The scheme exhibits the following features a It does not require that and choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit b It allows and to generate a key of arbitrary length using a single quantum system three EPR pairs, instead of a long sequence of them c Detecting requires the comparison of fewer bits d Entanglement is an essential ingredient The scheme assumes reliable measurements of the Bell operator PACS numbers: 07Dd, 07Hk, 0Bz The two main goals of cryptography are for two distant parties, and, to be able to communicate in a form that is unintelligible to a third party,, and to prove that the message was not altered in transit Both of these goals can be accomplished securely if both and are in possession of the same secret random sequence of bits, a key [] Therefore, one of the main problems of cryptography is the key distribution problem, that is, how do and, who initially share no secret information, come into the possession of a secret key, while being sure that cannot acquire even partial information about it This problem cannot be solved by classical means, but it can be solved using quantum mechanics [] The security of protocols for quantum key distribution QKD such as the Bennett- Brassard 98 BB8 [], E9 [], B9 [], and other protocols [,], is assured by the fact that while information stored in classical form can be examined and copied without altering it in any detectable way, it is impossible to do that when information is stored in unknown quantum states, because an unknown quantum state cannot be reliably cloned no-cloning theorem [7] In these protocols security is assured by the fact that both and must choose randomly between two possible Phys Rev A, 0 000 After its publication, Zhang, Li, and Guo showed that the protocol is insecure against a particular eavesdropping attack quantph/00090 A modified version which avoids this attack is presented in quant-ph/00090 Electronic address: adan@cicaes, fitez@sisucmes measurements In this paper I introduce a QKD scheme which does not require that and choose between alternative measurements This scheme is based on entanglement swapping [8 0] between two pairs of qubits quantum two-level systems, induced by a Bell operator measurement [] The Bell operator is a nondegenerate operator which acts on a pair of qubits i and j, and projects their combined state onto one of the four Bell states 00 ij = 0 i + i j, j = i j, j = j + i, ij = j i Entanglement swapping works as follows Consider a pair of qubits, i and j, prepared in one of the four Bell states, for instance, ij Consider a second pair of qubits k and l prepared in another Bell state, for instance, 0 kl If a Bell operator measurement is performed on i and k, then the four possible results 00, 0, 0, and have the same probability to occur In fact, the outcome of each measurement is purely random Suppose that the result 00 is obtained, consequently the state of the pair i and k after the measurement is 00 ik Moreover, the state of j and l is projected onto state 0 jl Therefore, the state of j and l becomes entangled although they have never interacted I will denote the initial state of the pairs i, j and k, l, in the previous example by ij 0 kl, and the final state of the pairs i, k and j, l by 00 ik l Suppose that the initial state of the pairs i, j and k, l is a product of two Bell states and, as in the previous example, a Bell operator measurement is executed on two qubits, one of each pair; then, after the measurement the state of the pairs i, k and j, l becomes a product of two Bell states All possibilities are collected in Table I The proposed scheme for QKD is illustrated in Fig and it is described as follows i Consider six qubits numbered to prepares qubits and in the Bell state, and qubits and in the Bell state 0 In a remote place, prepares qubits and in the Bell state 0 All this information is public and will be the only transmitted qubits during the process will always retain qubits,, and ; and will always retain qubit

ii transmits qubit to using a public channel This channel must be a transmission medium that isolates the state of the qubit from interactions with the environment iii secretly measures the Bell operator on qubits and, and secretly measures the Bell operator on qubits and The results of both experiments are correlated, although and do not know how as yet The purpose of the next step is to elucidate how the results are correlated without publicly revealing either of them iv transmits qubit to using a public channel Then measures the Bell operator on qubits and, and publicly announces the result Suppose that has obtained in her secret measurement on qubits and Then, since the initial state of,,, and was 0, by using Table I knows that the state of and is 0 In addition, suppose that obtains 00 in the public measurement on and Then, since she knows that the previous state of,,, and was 0 0, by using Table I knows that has obtained 00 in his secret measurement on and Following a similar reasoning, can know that has obtained in her secret measurement on and Previously, and have agreed to choose the sequence of results of s secret measurements to form the key The two initial bits of the key are therefore The public information shared by and is not enough for to acquire any knowledge of the result obtained by one of the parts Using this information only knows that one of the following four possible combinations of results for and s secret measurements have occurred: 00 for s result and for s, 0 and 0, 0 and 0, and and 00 One Bell state can be transformed into another just by rotating one of the qubits Using this property, can change the Bell state of qubits and and to a previously agreed public state Then the situation is similar to i and the next stage of the process can be started This scheme for QKD has the following features a It improves the rate of generated bits by transmitted qubit In BB8 and in B9 and in E9, and must choose between two alternative measurements in order to preserve security This implies that the number of useful random bits shared by and by transmitted qubit, before checking for eavesdropping, is 0 bits by transmitted qubit, both in BB8 and B9 and 0 in E9, or at the most, it can be made to approach in Ref [] In our scheme the rate is bit by transmitted qubit This is so because and always perform the same kind of measurement, a Bell operator measurement, and therefore, each of them acquires two correlated random bits after each stage of the process In each of these stages, only two qubits are transmitted one from to and another from to This improvement is very useful since a key must be as large as the message to be transmitted written as a sequence of bits, and cannot be reused for subsequent messages [] b It only requires a single quantum system three EPR pairs instead of a long sequence of quantum systems, to generate a key of arbitrary length By contrast with previous schemes, in the one presented here no source of qubits is needed The same two qubits qubits and are transmitted to and from and over and over again [] c The detection of requires the comparison of fewer bits The transmitted qubits do not encode the bits that form the key, but only the type of correlation between the results of the experiments that allow and to secretly generate the key Therefore, intercepting and copying them does not allow to acquire any information about the key In fact, the state of the transmitted qubits is public However, can use a strategy also based on entanglement swapping to learn s sequence of secret results This strategy is illustrated in Fig and is described as follows a Consider the same scenario as in i but suppose has two additional qubits 7 and 8, initially prepared in a Bell state, for instance, 00 78 b intercepts qubit that send to and makes a Bell operator measurement on qubits and 8 Then qubits and 7 become entangled in a known to Bell state For instance, if after s measurement the state of and 8 is 00 8, then the state of and 7 becomes 7 Therefore, after s intervention the real situation is not that described in ii Now qubit is entangled with s qubit 7, and is entangled with s 8 a In this new scenario, after s s measurement on qubits and and, the state of qubits and 7 and 8 becomes a Bell state For instance, if obtains 00, the state of qubits and 7 and 8 would be 0 7 0 8 However, these states are unknown to, because she still does not know the results of s and s measurements b intercepts qubit that sends to and makes a Bell operator measurement on qubits and 8 This reveals the state they were in Then can know s result For instance, in our example, would find 0 and would know that s result was 00 c makes a Bell operator measurement on qubits 7 and 8 Then qubits and becomes entangled in a Bell state still unknown to, because she does not know s secret result For instance, if obtains 0, then qubits and would be in the state 0 gives qubit to makes a measurement on and and announces the result Then can know the previous state of and 7 0 7, in our example and the result of s measurement on and

, in our example However, s intervention changes the correlation that and expect between their secret results For instance, in our example,, using his result and the result publicly announced by, thinks that the two initial bits of the key are 0 As in previous QKD protocols, in our scheme and can detect s intervention by publicly comparing a sufficiently large random subset of their sequences of bits, which they subsequently discard If they find that the tested subset is identical, they can infer that the remaining untested subset is also identical, and therefore can form a key In BB8, for each bit tested by and, the probability of that test revealing the presence of given that is indeed present is Thus, if N bits are tested, the probability of detecting given that she is present is N In our scheme if and compare a pair of bits generated in the same step, the probability for that test to reveal is Thus if n pairs N = n bits are tested, the probability of s detection is N This improvement in the efficiency of the detection of eavesdropping has been pointed out for a particular eavesdropping attack, it would be interesting to investigate whether more general attacks exist and whether the improvement in efficiency is also present in these cases d It uses entanglement as an essential tool QKD was the first practical application of quantum entanglement [] However, as shown in Ref [], entanglement was not an essential ingredient, in the sense that almost the same goals can be achieved without entanglement However, subsequent striking applications of quantum mechanics such as quantum dense coding [,], teleportation of quantum states [8,,7], entanglement swapping [8,9], and quantum computation [8], are strongly based on quantum entanglement The scheme described here relies on entanglement in the sense that it performs a task QKD with properties a, b, and c that cannot be accessible without entanglement The practical feasibility of the scheme described in this paper hinges on the feasibility of a reliable ie, with 00% theoretical probability of success Bell operator measurement Bell operator measurements are also required for reliable double density quantum coding and teleportation As far as I know, the first proposals for a reliable Bell operator measurement are those which discriminate between the four polarization-entangled twophoton Bell states using entanglement in additional degrees of freedom [9] or using atomic coherence [0] It is not expected that the protocol for QKD introduced in this paper will be able to improve existing experiments [] for real quantum cryptography in practice Its main importance is conceptual: it provides a different quantum solution to a problem already solved by quantum mechanics The author thanks J L Cereceda, O Cohen, A K Ekert, C Fuchs, T Mor, and B Orfila for helpful comments This work was supported by the Universidad de Sevilla Grant No OGICYT-9-97 and the Junta de Andalucía Grant No FQM-9 [] The Vernam cipher or one-time pad [G S Vernam, J Am Inst Electr Eng, 09 9] is the only known absolutely secure method for encrypting a message [C E Shannon, Bell Syst Tech J 8, 7 99] writes the message as sequence of bits, and adds the key to it, bit by bit, modulo The result is the ciphertext, which is publicly transmitted can recover the message by adding the key to the ciphertext, modulo If the same key is used for a second message, can obtain the addition modulo of both messages just by adding their chipertexts If only a finite vocabulary is used in the messages, this is enough to reveal both of them [] C H Bennett and G Brassard, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India IEEE, New York, 98, p 7 [] A K Ekert, Phys Rev Lett 7, 99 [] C H Bennett, Phys Rev Lett 8, 99 [] L Goldenberg and L Vaidman, Phys Rev Lett 7, 9 99; 77, 99; A Peres, ibid 77, 99; T Mor, ibid 80, 7 998 [] M Ardehali, G Brassard, H F Chau, and H-K Lo, quant-ph/980007 unpublished [7] W K Wootters and W H Zurek, Nature London 99, 80 98 [8] C H Bennett, G Brassard, C Crépeau, R Jozsa, A Peres, and W K Wootters, Phys Rev Lett 70, 89 99 [9] M Żukowski, A Zeilinger, M A Horne, and A K Ekert, Phys Rev Lett 7, 87 99; S Bose, V Vedral, and P L Knight, Phys Rev A 7, 8 998; J-W Pan, D Bouwmeester, H Weinfurter, and A Zeilinger, Phys Rev Lett 80, 89 998 [0] Entanglement swapping has been previously used in QKD for a different purpose, O Cohen, Helv Phys Acta 70, 70 997 [] S L Braunstein, A Mann, and M Revzen, Phys Rev Lett 8, 9 99 [] Existing schemes for quantum key distribution can also work with a small numbers of qubits, as long as they are symmetrised so that in each round of the protocol and reverse their roles [] C H Bennett, G Brassard, and N D Mermin, Phys Rev Lett 8, 7 99 [] C H Bennett and J Wiesner, Phys Rev Lett 9, 88 99 [] K Mattle, H Weinfurter, P G Kwiat, and A Zeilinger,

Phys Rev Lett 7, 99 [] D Bouwmeester, J Pan, K Mattle, M Eibl, H Weinfurter, and A Zeilinger, Nature London 90, 7 997 [7] D Boschi, S Branca, F De Martini, L Hardy, and S Popescu, Phys Rev Lett 80, 998 [8] P W Shor, in Proceedings of the th Annual Symposium on the Foundations of Computer Science, Santa Fe, New Mexico, 99 edited by S Goldwasser IEEE, Los Alamitos, CA, 99, p ; L K Grover, Phys Rev Lett 79, 997, D S Abrams and S Lloyd, ibid 79, 8 997 [9] P G Kwiat and H Weinfurter, Phys Rev A 8, R 998 [0] M O Scully, B-G Englert, and C J Bednar, Phys Rev Lett 8, 999 [] P D Townsend, Nature London 8, 7 997; G Ribordy, J-D Gautier, N Gisin, O Guinnard, and H Zbinden, Electron Lett, 998; W T Buttler et al, Phys Rev Lett 8, 8 998; Phys Rev A 7, 79 998 Initial state ijkl Possible final states ikjl 0000 00 00 0000 00 00 000 000 0 0 000 000 0 0 000 0 000 0 000 0 000 0 00 00 00 00 00 00 00 00 TABLE I All possible results of a Bell operator measurement on qubits i and k For example, if the initial state is ij 0 kl, you must locate 0 on the left half of the table Then, after a Bell operator measurement on i and k, the four possible final states are represented on the right half of the table by 000, 0, 000, and 0; where, for instance, 000 means 00 ik l

i "" "0" "0" a "" "0" {00} "0" ii iii "0" "" "0" "" [00] "0" "0" 00 b, a "" {} {00} {00} "0" "0" {} {00} [00] "0" 0 0 "0" iv [] [00] b 0 {0} "00" FIG QKD scheme based on entanglement swapping The bold lines connect qubits in Bell states, the dashed lines connect qubits on which a Bell operator measurement is made, and the pointed lines connect qubits in Bell states induced by entanglement swapping 00 means that the Bell state 00 is public knowledge, 00 means that it is only known to, [00] means that it is only known to, 00 means that it is unknown to all the parts, [00] means that it is only known to and, etc c {} "0" 0 {0} 8 7 {0} 0 {0} FIG s strategy to obtain s secret result {00} means that the Bell state 00 is only known to The remaining notation is the same as in Fig