4
Physics Letters A 355 (2006) 172–175 www.elsevier.com/locate/pla On the information-splitting essence of two types of quantum key distribution protocols Fei Gao a,b,, Fen-Zhuo Guo a , Qiao-Yan Wen a , Fu-Chen Zhu c a School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China b State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, China c National Laboratory for Modern Communications, PO Box 810, Chengdu 610041, China Received 26 December 2005; received in revised form 10 February 2006; accepted 13 February 2006 Available online 20 February 2006 Communicated by P.R. Holland Abstract With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation between BB84-type protocols and two-step-type ones. It is shown that they have the same essence, that is, information splitting. The choice of an orthogonal carrier or a nonorthogonal carrier, which looks like the main difference between these two types of protocols, is not an important, even not a very explicit matter. This result is instructive for related scheme designing and security analyzing. © 2006 Elsevier B.V. All rights reserved. PACS: 03.67.Dd; 03.65.-w Keywords: Quantum key distribution; Quantum cryptography; Entanglement The goal of cryptography is to ensure that a secret message is transmitted between two users, traditionally called Alice and Bob, in a way that any eavesdropper (such as Eve) cannot read it. Till now, it is generally accepted that the only proven se- cure cryptosystem is the scheme of one-time pad, which utilizes a previously shared secret key to encrypt the message transmit- ted in the public channel. However, it is difficult for all existing classical cryptosystems to establish a random key with uncon- ditional security between Alice and Bob. Fortunately, quantum key distribution (QKD) [1], the approach using quantum me- chanics principles for the distribution of secret key, can accom- plish this task skillfully. The security of most QKD protocols is based on randomness [2] or the nonlocality nature of quantum systems [3–6]. Some other branches of quantum cryptography such as QKD with noisy channel [7] and QKD network [8] were also studied. * Corresponding author. E-mail address: [email protected] (F. Gao). The first QKD scheme, BB84 protocol, was proposed in 1984 by Bennett and Brassard [2]. Here we give a brief in- troduction of a well-known variation of it, that is, the delayed choice BB84 protocol. In this scheme Alice randomly generates single photons polarized along one of four possible directions, 0 , 45 , 90 or 135 , and sends them to Bob. Note that these four states form two conjugate bases {0 , 90 } and {45 , 135 }. Af- ter Bob received these photons, Alice tells Bob which basis she used for each one. Afterwards, Bob measures every photon in the same basis as that of Alice and it follows that he can know what states Alice sent from the measurement results. As the dif- ferent states can be encoded into 0 and 1, Alice and Bob will share a sequence of key bits. Eve’s presence can be detected by publicly comparing a subsequence of these bits. Obviously, Eve cannot elicit correct information without introducing errors be- cause she does not know, when these photons are transmitted in the quantum channel, which of the two conjugate bases was used to prepare each of them. If Eve tries to measure one cer- tain photon to acquire information, she will bring disturbance once she uses a wrong basis (the announcement of bases from Alice is too late for Eve). Nevertheless Bob will obtain all of 0375-9601/$ – see front matter © 2006 Elsevier B.V. All rights reserved. doi:10.1016/j.physleta.2006.02.027

On the information-splitting essence of two types of quantum key distribution protocols

  • Upload
    fei-gao

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: On the information-splitting essence of two types of quantum key distribution protocols

Physics Letters A 355 (2006) 172–175

www.elsevier.com/locate/pla

On the information-splitting essence of two types of quantum keydistribution protocols

Fei Gao a,b,∗, Fen-Zhuo Guo a, Qiao-Yan Wen a, Fu-Chen Zhu c

a School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, Chinab State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, China

c National Laboratory for Modern Communications, PO Box 810, Chengdu 610041, China

Received 26 December 2005; received in revised form 10 February 2006; accepted 13 February 2006

Available online 20 February 2006

Communicated by P.R. Holland

Abstract

With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation between BB84-type protocols and two-step-typeones. It is shown that they have the same essence, that is, information splitting. The choice of an orthogonal carrier or a nonorthogonal carrier,which looks like the main difference between these two types of protocols, is not an important, even not a very explicit matter. This result isinstructive for related scheme designing and security analyzing.© 2006 Elsevier B.V. All rights reserved.

PACS: 03.67.Dd; 03.65.-w

Keywords: Quantum key distribution; Quantum cryptography; Entanglement

The goal of cryptography is to ensure that a secret messageis transmitted between two users, traditionally called Alice andBob, in a way that any eavesdropper (such as Eve) cannot readit. Till now, it is generally accepted that the only proven se-cure cryptosystem is the scheme of one-time pad, which utilizesa previously shared secret key to encrypt the message transmit-ted in the public channel. However, it is difficult for all existingclassical cryptosystems to establish a random key with uncon-ditional security between Alice and Bob. Fortunately, quantumkey distribution (QKD) [1], the approach using quantum me-chanics principles for the distribution of secret key, can accom-plish this task skillfully. The security of most QKD protocols isbased on randomness [2] or the nonlocality nature of quantumsystems [3–6]. Some other branches of quantum cryptographysuch as QKD with noisy channel [7] and QKD network [8] werealso studied.

* Corresponding author.E-mail address: [email protected] (F. Gao).

0375-9601/$ – see front matter © 2006 Elsevier B.V. All rights reserved.doi:10.1016/j.physleta.2006.02.027

The first QKD scheme, BB84 protocol, was proposed in1984 by Bennett and Brassard [2]. Here we give a brief in-troduction of a well-known variation of it, that is, the delayedchoice BB84 protocol. In this scheme Alice randomly generatessingle photons polarized along one of four possible directions,0◦, 45◦, 90◦or 135◦, and sends them to Bob. Note that these fourstates form two conjugate bases {0◦, 90◦} and {45◦, 135◦}. Af-ter Bob received these photons, Alice tells Bob which basis sheused for each one. Afterwards, Bob measures every photon inthe same basis as that of Alice and it follows that he can knowwhat states Alice sent from the measurement results. As the dif-ferent states can be encoded into 0 and 1, Alice and Bob willshare a sequence of key bits. Eve’s presence can be detected bypublicly comparing a subsequence of these bits. Obviously, Evecannot elicit correct information without introducing errors be-cause she does not know, when these photons are transmittedin the quantum channel, which of the two conjugate bases wasused to prepare each of them. If Eve tries to measure one cer-tain photon to acquire information, she will bring disturbanceonce she uses a wrong basis (the announcement of bases fromAlice is too late for Eve). Nevertheless Bob will obtain all of

Page 2: On the information-splitting essence of two types of quantum key distribution protocols

F. Gao et al. / Physics Letters A 355 (2006) 172–175 173

the key bits (noise is not concerned here) sent by Alice becausehe can perform his measurements after Alice’s announcement.Several other schemes utilize similar idea to distribute key (forexample, see Refs. [9–12]). We customarily call them BB84-type protocols. The main feature of these protocols is that thecommunicators use nonorthogonal states so that Eve cannot dis-tinguish them completely, on which the security is based.

Since Goldenberg and Vaidman came up with a QKD proto-col based on orthogonal states in 1995 [13], much attention hasbeen focused on this type of quantum cryptography [14–17]. Inthese schemes the information carrier is composed of a set oforthogonal states. As we know, orthogonal states can be easilydistinguished with no disturbance and, therefore, as the car-rier, they cannot be transmitted in the public quantum channeldirectly. The above proposals give a smart resolvent, that is,splitting the information unit, which denotes the informationencoded in one complete unit of carrier, into two parts, e.g., thetwo parts of a photon wave packet [13,14] or two correlated par-ticles [15–17], and sending them one by one (see Fig. 1). Notethat one can never read the total information transmitted with-out introducing disturbance by measuring only one of the twoparts. In this condition, Eve cannot access both parts simultane-ously and it follows that her eavesdropping is doomed to failure.In this Letter we ignore the case that Eve intercepts legal wavepackets (or particles) and sends some fake ones to Bob, whereEve will introduce errors though she can obtain both parts atone time. Because the information unit is always transmittedby two steps, we call this type of schemes two-step-type proto-cols.

In this Letter we focus our attention on the relation betweenBB84-type protocols and two-step-type ones. In fact, Peres andthe authors of Ref. [13] discussed the similar topic long timeago, but they could not come to an agreement about it [18,19].As far as the great influence of both types of QKD on quan-tum cryptography is concerned, it is of importance to clear uptheir connection further. We consider these two types of QKDare based on the same essence, that is, information splitting.To demonstrate our viewpoint, we will introduce another QKDscheme, called the mid protocol, and compare it with the abovetwo types of QKD respectively, which is similar to the way em-

ployed by Bennett et al. [20] when they analyzed the connectionbetween BB84 protocol and E91 protocol [3].

To begin with, let us examine what results Alice obtainsafter the information-splitting operation on the carrier in two-step-type protocols. In Ref. [13] (Ref. [14]), with the help ofa Mach–Zehnder interferometer, the information unit is splitinto two wave packets which have equal (different) amplitudes.In Refs. [15–17], alternatively, the information carrier is ina two-particle state and it is divided into two single particlesdirectly. It can be seen that, no matter how it is split, both partsobtained are quantum ones in previous schemes. Now we con-sider a special way to split, that is, splitting the information unitinto one quantum part and one classical part. A simple instance(the mid protocol) proceeds as follows (also see Fig. 1).

(i) Alice generates a sequence of Einstein–Podolsky–Rosen(EPR) pairs (a1, b1), (a2, b2), . . . , (am, bm), where (ai, bi) de-notes one EPR pair (1 � i � m, m > 0 is an integer) and eachpair is randomly in one of four Bell states, |Φ±〉 = 1/

√2(|00〉±

|11〉) and |Ψ ±〉 = 1/√

2(|01〉 ± |10〉). Suppose |Φ+〉, |Φ−〉,|Ψ +〉, and |Ψ −〉 represent bit values 00, 01, 10, and 11, respec-tively.

(ii) Alice splits each information unit into a quantum partand a classical part. Here Alice takes every two adjoining pairsas a complete carrier unit. Without loss of generality, considerthe first carrier unit [a1, b1, a2, b2]. The information-splittingoperation can be described as follows. Alice performs, at ran-dom, one of the following two operations on the carrier unit:(1) doing nothing; (2) exchanging the positions of particles b1and a2, that is, rearranging [a1, b1, a2, b2] into [a1, a2, b1, b2],which can be easily realized by storage rings. After that theseparticles form the quantum part. While the classical part is 0or 1, corresponding to the operation (1) or (2), respectively.

(iii) Alice sends the two parts to Bob by two steps as in theprevious two-step-type protocols. More concretely, the quan-tum part is sent first and then the classical part follows. Thetime delay is brought about by the storage rings SR1. That is,when the quantum part is transmitted in the upper channel, theclassical part is still in SR1. At the same time, the quantum partis already in SR2 when the classical part is transmitted in the

Fig. 1. The QKD model of two-step-type protocols. In these protocols Alice splits the complete information (carried by orthogonal states) into two quantum partsand sends them one by one. That is, they never appear simultaneously in the insecure channel, which can be achieved by using storage rings SR1. At the destination,with the help of storage rings SR2, Bob can recover the complete information after both parts arrived. In fact, BB84-type protocols can also be depicted by thismodel. In this condition the lower channel is a classical channel instead of a quantum one. See the following paragraphs for details.

Page 3: On the information-splitting essence of two types of quantum key distribution protocols

174 F. Gao et al. / Physics Letters A 355 (2006) 172–175

lower channel. As a result, Eve cannot access both parts simul-taneously.

(iv) When Bob has received both parts, he combines themand tries to recover the complete information. If the classicalpart is 1, Bob exchanges the positions of the second and thethird particles. Otherwise he does nothing.

(v) Bob measures this carrier unit to obtain the key. Bobperforms Bell measurements on the first two particles and thelast two particles. As a result, he can get four bits of key fromhis measurement result (according to the above coding rule).

In the above description, for simplicity, we only consideredthe first carrier unit, i.e., the first two EPR pairs. The otherEPR pairs generated by Alice can be used in a similar way. Atlast, Alice and Bob publicly compare a subsequence of the bitssent by Alice with those received by Bob to detect Eve’s pres-ence. If there is no eavesdropping Alice and Bob will obtaina sequence of secure key after error correction and privacy am-plification [1]. The operation of order rearrangement is inspiredby the work of Deng and Long [21]. It should be emphasizedthat our main aim is using our scheme to discuss the relation be-tween BB84-type protocols and two-step-type ones instead ofthe QKD scheme itself.

It can be seen that the mid protocol possesses the same fea-tures of two-step-type protocols such as using orthogonal statesas carrier, splitting the information unit into two parts and send-ing them one by one, etc. The only difference between the midprotocol and two-step-type protocols is that the former splits theinformation unit into a quantum part and a classical one, whilethe latter splits it into two quantum parts. From this perspective,the mid protocol is a variation of two-step-type protocols.

Now let us observe the relation between the mid protocoland BB84-type protocols. Obviously, if we interpret the delayedtime as the effect of storage rings, the delayed choice BB84-type protocols can be depicted by Fig. 1, too. Equivalently,Alice sends the photons to Bob through the upper channel and,after Bob has received them, tells Bob the classical bits (i.e.,the bases information) through the lower channel. Therefore,the mid protocol and BB84-type protocols have very similarfeature. Intuitively, the only difference between them is thatthe mid protocol uses orthogonal states as carrier while BB84-type protocols are based on nonorthogonal states. However, it isjust a superficial phenomenon. In fact, if we consider a certaincomplete carrier unit such as [a1, b1, a2, b2] in the mid proto-col, its possible states (i.e., the two possible states after Alice’sinformation-splitting operation) are nonorthogonal indeed. Forexample, suppose the two EPR pairs are both in state of |Φ+〉,that is, |ϕ〉a1b1 = |ϕ〉a2b2 = |Φ+〉. In this condition the state ofthis carrier unit can be written as

|ϕ〉a1b1a2b2 = ∣∣Φ+⟩ ⊗ ∣∣Φ+⟩

(1)= 1

2

(|0000〉 + |0011〉 + |1100〉 + |1111〉).

After Alice’s information-splitting operation, this carrier unitwill be changed into one of two possible states |ϕ〉a1b1a2b2 and

|ϕ〉a1a2b1b2 , where

(2)|ϕ〉a1a2b1b2 = 1

2

(|0000〉 + |0101〉 + |1010〉 + |1111〉).From Eqs. (1) and (2) we can calculate the inner product ofthese two states

a1b1a2b2〈ϕ|ϕ〉a1a2b1b2

= 1

2

(〈0000| + 〈0011| + 〈1100| + 〈1111|)

× 1

2

(|0000〉 + |0101〉 + |1010〉 + |1111〉)

(3)= 1

2.

Obviously, the two possible states are nonorthogonal and Evecan never distinguish them deterministically without Alice’sclassical information. When the two EPR pairs are originallyin other Bell states, we can obtain the same conclusion by sim-ilar deduction. Therefore, in substance, the states transmitted inthe quantum channel are nonorthogonal and the mid protocolhas the same essence as that of BB84-type protocols.

From another point of view, we can recognize the similar-ity between the mid protocol and BB84-type protocols moreclearly by reinterpreting the latter (for example, the delayedchoice BB84 protocol). That is, Alice randomly prepares sin-gle photons polarized along one of two possible directions,0◦ or 90◦ (note that they are orthogonal states). Afterwards,Alice makes an information-splitting operation which can bedescribed as follows. Alice performs, at random, one of thefollowing two operations on each photon: (1) doing nothing;(2) rotating its polarized direction by 45◦ clockwise, that is,changing its state into the corresponding one in the other ba-sis {45◦, 135◦}. After that the photon forms the quantum part.While the classical part is 0 or 1, corresponding to the operation(1) or (2), respectively. At the destination, when Bob receivedboth parts, he can recover and obtain the original informationjust by a reverse operation and a measurement in the basis{0◦, 90◦}. It can be seen that the carrier states are orthogonal(nonorthogonal) before (after) the information-splitting opera-tion, which is quite similar with that of the mid protocol. Ina word, BB84-type protocols are actually equivalent to the midprotocol1 (the difference between them is their material carri-ers).

From above analysis we can draw a conclusion that BB84-type protocols and two-step-type protocols are not entirely op-posite. Contrarily, they have the same essence, that is, informa-tion splitting. An orthogonal carrier or a nonorthogonal carrier,

1 As the anonymous reviewer mentioned, though both protocols B92 [9]and BB84 are based on nonorthogonal states, they differ in Eve’s ability toeavesdrop. In particular, in B92, Eve can perform an optimal Positive Operator-Valued Measure (POVM) that will distinguish the two signal states with someprobability. If she can carry out a sophisticated channel-replacing attack ona system with high enough loss, she may have perfect knowledge of the signalsthat Bob receives without introducing any disturbance (by only transmitting theones she can distinguish). This defect is not present in BB84. As far as thisdifference is concerned, BB84 is more closer to the mid protocol than B92.

Page 4: On the information-splitting essence of two types of quantum key distribution protocols

F. Gao et al. / Physics Letters A 355 (2006) 172–175 175

which looks like the main difference between these two typesof protocols, is not an important, even not a very explicit matter.To give a more concrete description, we take the mid protocolas our example (BB84-type protocols have the same feature).As far as Eve is concerned, the possible states of the carrierunit, which is the smallest system she has to distinguish, arenonorthogonal. But for Bob, the possible states that need to bedistinguished are indeed orthogonal because Bob knows whichtwo particles were initially in a Bell state (or which basis wasused when Alice prepared each photon in BB84-type proto-cols) with the help of Alice’s classical information. One mayargue that the possible states of the separate quantum partsare not nonorthogonal in some two-step-type protocols. (Forexample, the quantum part can be in mixed state, mostly inmaximally mixed state ρ = 1

2 (|0〉〈0| + |1〉〈1|) [13,16,17]. Non-maximally mixed state was subtly employed to remove the needfor random timing tests in Ref. [14].) However, we can find thateach quantum part has a feature that Eve cannot elicit the keyinformation (i.e., the complete information) without introduc-ing disturbance, which is same as that of the above so-callednonorthogonal states. Here we generally call both of them “in-distinguishable states”. (Strictly speaking, it is preferable to callnonorthogonal states “not perfectly distinguishable states”, be-cause they can still be distinguished with certain probability inspite of the introduced errors.)

Before we conclude, it is worthwhile to inspect our so-called“the same essence” of BB84-type protocols and two-step-typeprotocols, which includes (1) the carrier state, which containsthe complete key information, is split into two parts (two quan-tum parts or one quantum part and one classical one) and theyare sent one by one to prevent Eve from simultaneously takingcontrol of both of them. As described in Fig. 1, if Eve wantsto access both parts at one time, she must send fake particlesor wave packets to Bob, which will be detected by the legalcommunicators; (2) the possible states of each quantum partare indistinguishable (or not perfectly distinguishable) states,which means that Eve cannot elicit useful information withoutintroducing errors. Of course, Eve cannot extract key informa-tion from the classical part, either; (3) anyone who obtains bothparts can recover the initial carrier state and then distinguishit from several possible (orthogonal or distinguishable) states.Namely, when Bob received both parts he can obtain the keyinformation Alice sent. In fact, the security of BB84-type proto-cols and two-step-type protocols just lies on the above essence.

Finally, we have to confess that there are still some differ-ences between BB84-type protocols and two-step-type proto-cols. The main one is that the former splits the information unitinto a quantum part and a classical one, while the latter splits itinto two quantum parts. As a consequence, Bob can guess thevalue of the classical part (i.e., the one comes later) instead ofwaiting until its arriving in BB84-type protocols. Equivalently,Bob randomly selects a basis to measure each photon and at last

the communicators discard the bits from those photons that areprepared and measured in different bases, which is just the ideaof the original BB84 protocol [2] (this feature also applies to themid protocol). On the contrary, in two-step-type protocols thelater part is a quantum one and Bob cannot do such guesswork.It should be emphasized that, however, this difference betweenthese two types of QKD protocols cannot cover up their sameessence described above.

To summarize, we have mainly discussed the relation be-tween BB84-type protocols and two-step-type ones. By pre-senting a simple QKD scheme (the mid protocol) we take cog-nizance of some connections between these two types of pro-tocols and draw a conclusion that they have the same essenceas described above (see Fig. 1). This result can help us to makeclear the base of some QKD protocols’ security. Furthermore,it is instructive for related scheme designing and security ana-lyzing.

Acknowledgements

We thank the anonymous reviewer for helpful comments.This work was supported by the National Natural Science Foun-dation of China, Grant No. 60373059; the National Laboratoryfor Modern Communications Science Foundation of China;the National Research Foundation for the Doctoral Program ofHigher Education of China, Grant No. 20040013007; the Grad-uate Students Innovation Foundation of BUPT; and the ISNOpen Foundation.

References

[1] N. Gisin, G. Ribordy, W. Tittel, et al., Rev. Mod. Phys. 74 (2002) 145.[2] C.H. Bennett, G. Brassard, in: Proceedings of IEEE International Con-

ference on Computers, Systems and Signal Processing, Bangalore, India,IEEE, New York, 1984, p. 175.

[3] A.K. Ekert, Phys. Rev. Lett. 67 (1991) 661.[4] A. Cabello, Phys. Rev. A 61 (2000) 052312;

Y.S. Zhang, C.F. Li, G.C. Guo, Phys. Rev. A 63 (2001) 036301;A. Cabello, Phys. Rev. A 64 (2001) 024301.

[5] F. Gao, F.Z. Guo, Q.Y. Wen, F.C. Zhu, Phys. Lett. A 349 (2006) 53.[6] G.L. Giorgi, Phys. Rev. A 71 (2005) 064303.[7] X.B. Wang, Phys. Rev. A 71 (2005) 052328.[8] P. Xue, C.F. Li, G.C. Guo, Phys. Rev. A 65 (2002) 022317.[9] C.H. Bennett, Phys. Rev. Lett. 68 (1992) 3121.

[10] D. Bruß, Phys. Rev. Lett. 81 (1998) 3018.[11] H. Bechmann-Pasquinucci, N. Gisin, Phys. Rev. A 59 (1999) 4238.[12] H. Bechmann-Pasquinucci, A. Peres, Phys. Rev. Lett. 85 (2000) 3313.[13] L. Goldenberg, L. Vaidman, Phys. Rev. Lett. 75 (1995) 1239.[14] M. Koashi, N. Imoto, Phys. Rev. Lett. 79 (1997) 2383.[15] G.P. Guo, C.F. Li, B.S. Shi, et al., Phys. Rev. A 64 (2001) 042301.[16] G.L. Long, X.S. Liu, Phys. Rev. A 65 (2002) 032302.[17] F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68 (2003) 042317.[18] A. Peres, Phys. Rev. Lett. 77 (1996) 3264.[19] L. Goldenberg, L. Vaidman, Phys. Rev. Lett. 77 (1996) 3265.[20] C.H. Bennett, G. Brassard, N.D. Mermin, Phys. Rev. Lett. 68 (1992) 557.[21] F.G. Deng, G.L. Long, Phys. Rev. A 68 (2003) 042315.