24
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS

Quantum Cryptography

Embed Size (px)

DESCRIPTION

December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS. Quantum Cryptography. Introduction Photon sources Quantum Secret Sharing. Introduction Photon sources Quantum Secret Sharing. How to measure information (1). Claude E. Shannon 1948 Information entropy Mutual information. [bits]. - PowerPoint PPT Presentation

Citation preview

Page 1: Quantum Cryptography

Quantum Cryptography

December, 3rd 2007

Philippe LABOUCHEREAnnika BEHRENS

Page 2: Quantum Cryptography

1. Introduction

2. Photon sources

3. Quantum Secret Sharing

Page 3: Quantum Cryptography

1. Introduction

2. Photon sources

3. Quantum Secret Sharing

Page 4: Quantum Cryptography

How to measure information (1)

• Claude E. Shannon 1948

• Information entropy

• Mutual information

ii

i

i x

n

i

xx

n

i

x ppp

pXH 2

1

2

1

log1

log)(

Xx Yy ypxp

yxpyxpYXI

)()(

),(log),(, 2

[bits

]

Page 5: Quantum Cryptography

How to measure information (2)

• Relation between H and I

• Mutual information between 2 parties

)|()(),( YXHXHYXI

posterioriaprioriaKL HHI

)(log2 NH apriori

XxYy

iaposterior yxpyxpypH )|(log)|()( 2

Page 6: Quantum Cryptography

Venn diagrams

)|()|():,(),:( ABHCBHCBAICBAI

Page 7: Quantum Cryptography

The BB84 protocol

Page 8: Quantum Cryptography

The BB84 protocol: principle

• 2 conjugate basis

• Information encoded in photon’s polarization→ ’0’ ≡ — & /→ ’1’ ≡ | & \

• Quantum & classical channels used for key exchange

Charles H. Bennett

Gilles Brassard

Page 9: Quantum Cryptography

From random bits to a sifted key

Alice’s random bits 0 1 1 O O 1

Random sending bases D D R R D RPhoton Alice

sends / \ — — / —Random

receiving bases R D R D D RBits as received

by Bob 1 1 1 0 0 1Bob reports

basis of received bits

R D R D D RAlice says which

were correct no OK OK no OK OKPresumably

shared information

. 1 1 . 0 1Bob reveals

some key bits at random

. . 1 . 0 .Alice confirms

them . . OK . OK .Remaining shared bits . 1 . . . 1

Quantu

m

transm

issi

on

Public

dis

cuss

ion

Page 10: Quantum Cryptography

Mutual information vs quantum bit error rate

bitsreceived

bitswrong

N

NQBER

Page 11: Quantum Cryptography

The no-cloning theorem

• Dieks, Wootters, Žurek 1982

”It is forbidden to create identical copies of an arbitrary

unknown quantum state.”

• Quantum operations : unitary & linear transformations on the state of a quantum system

Page 12: Quantum Cryptography

1. Introduction

2. Photon sources

3. Quantum Secret Sharing

Page 13: Quantum Cryptography

Sources of photons

• Thermal light

• Coherent light

• Squeezed light

11)(

m

m

th n

nmp

n

m

em

nmp

!)( 2nn

1nAverage photon number of photons in a mode

Number of photons

nm

Page 14: Quantum Cryptography

Faint-laser pulses

• <n> = μ ~ 0.1 photon / pulse

• Photon-number splitting attack!

• Dark counts of detectors vs high pulse rate & weaker pulses

darkAB pT detdetdetdet

2

2

darkdark

AB

ppT

2)0(1

)1()0(1

1

2 n

p

pp

p

pp

n

nmulti

nnp 1)0(!

Detection yield

Transmission efficiency

detABT

Tradeoff

Page 15: Quantum Cryptography

Entangled photon pairs

• SpontaneousParametric Down Conversion

• Idler photon acts as trigger for signal photon

• Very inefficient

Page 16: Quantum Cryptography

Single-photon sources

• Intercept/resend attack=> error rate < dark count rate !

• Condition for security:

• Drawback : dark counts & afterpulses

detdark

AB

pT

Transmission efficiency

Detection yielddet

ABT

Page 17: Quantum Cryptography

Practical limits of QC

• Realization of signal

• Stability under the influence of the environment (transportation)

- Birefringence- Polarization dispersion- Scattering

• Need of efficient sources & detectors (measurements)

Page 18: Quantum Cryptography

Bite rate as function of distance after error correction

and privacy amplificationPulse rate = 10 MHz

μ = 0.1 (faint laser pulses)

Losses: @ 800nm : 2dB / km @ 1300 nm: 0.35dB / km @ 1550 nm: 0.25 dB /km

Page 19: Quantum Cryptography

1. Introduction

2. Photon sources

3. Quantum Secret Sharing

Page 20: Quantum Cryptography

Quantum Secret Sharing (1)

Page 21: Quantum Cryptography

QSS (2)

• N-qubit GHZ source

• Define

z

N

z

NNGHZ 10

2

1

z

N

z

N

xN

N10

2

11

0

z

N

z

N

yN

Ni 10

2

11

0

z

N

z

Nz

z

N

z

Nz

11

00

Page 22: Quantum Cryptography

Goodbye GHZ, welcome single qubit

}2/3,2/{

},0{

Y

X

j

j

11)(

00)(

jijj

jj

eU

U

102

1 jji

N e

Page 23: Quantum Cryptography

Sequentially polarized single photon protocol

Original BB84 Modified BB84

Diagonal and Rectilinear bases Classes X and Y

/ and — ≡ ‘0’| and \ ≡ ‘1’

φj = {0, π/2} ≡ ’0’

φj = {π, 3π/2} ≡ ’1’

Correlated results if same bases used

Correlated results if 1cos1

N

jj

Page 24: Quantum Cryptography

Questions ?