4
VOLUME 77, NUMBER 13 PHYSICAL REVIEW LETTERS 23 SEPTEMBER 1996 Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels David Deutsch, 1 Artur Ekert, 1 Richard Jozsa, 2 Chiara Macchiavello, 1 Sandu Popescu, 3 and Anna Sanpera 1 1 Clarendon Laboratory, Department of Physics, University of Oxford, Parks Road, Oxford OX1 3PU, United Kingdom 2 School of Mathematics and Statistics, University of Plymouth, Plymouth, Devon PL4 8AA, United Kingdom 3 Department of Electrical, Computer and Systems Engineering, Boston University, Boston, Massachusetts 02215 (Received 26 April 1996) Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyze and have not been proved secure. We introduce the concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel. The scheme uses an “entanglement purification” procedure which, because it requires only a few quantum controlled- not and single-qubit operations, could be implemented using technology that is currently being developed. [S0031-9007(96)01288-4] PACS numbers: 89.70.+ c, 02.50.–r, 03.65.Bz, 89.80.+h Quantum cryptography [1–3] allows two parties (tra- ditionally known as Alice and Bob) to establish a secure random cryptographic key if, first, they have access to a quantum communication channel, and second, they can exchange classical public messages which can be moni- tored but not altered by an eavesdropper (Eve). Using such a key, a secure message of equal length can be transmitted over the classical channel. However, the se- curity of quantum cryptography has so far been proved only for the idealized case where the quantum channel, in the absence of eavesdropping, is noiseless. That is because, under existing protocols, Alice and Bob detect eavesdropping by performing certain quantum measure- ments on transmitted batches of qubits and then using statistical tests to determine, with any desired degree of confidence, that the transmitted qubits are not entangled with any third system such as Eve. The problem is that there is in principle no way of distinguishing entangle- ment with an eavesdropper (caused by her measurements) from entanglement with the environment caused by inno- cent noise, some of which is presumably always present. This implies that all existing protocols are, strictly speaking, inoperable in the presence of noise, since they re- quire the transmission of messages to be suspended when- ever an eavesdropper (or, therefore, noise) is detected. Conversely, if we want a protocol that is secure in the pres- ence of noise, we must find one that allows secure trans- mission to continue even in the presence of eavesdroppers. To this end, one might consider modifying the existing pro- tocols by reducing the statistical confidence level at which Alice and Bob accept a batch of qubits. Instead of the astronomically high level envisaged in the idealized proto- col, they would set the level so that they would accept most batches that had encountered a given level of noise. They would then have to assume that some of the information in the batch was known to an eavesdropper. It seems rea- sonable that classical privacy amplification [4] could then be used to distill, from large numbers of such qubits, a key in whose security one could have an astronomically high level of confidence [5]. However, no such scheme has yet been proved to be secure. Existing proofs of the security of classical privacy amplification apply only to classical com- munication channels and classical eavesdroppers. They do not cover the new eavesdropping strategies that become possible in the quantum case: for instance, causing a quan- tum ancilla to interact with the encrypted message, storing the ancilla and later performing a measurement on it that is chosen according to the data that Alice and Bob exchange publicly. In this paper we present a protocol that is secure in the presence of noise and an eavesdropper. It uses entanglement-based quantum cryptography [2], but with a new element, an “entanglement purification” procedure. This allows Alice and Bob to generate a pair of qubits in a state that is close to a pure, maximally entangled state, and whose entanglement with any outside system is arbitrarily low. They can generate this from any supply of pairs of qubits in mixed states with nonzero entanglement, even if an eavesdropper has had access to those qubits (see also [6,7]). Our procedure—a quantum privacy amplification algo- rithm — (abbreviated as QPA algorithm) can be performed by Alice and Bob at distant locations by a sequence of lo- cal operations which are agreed upon by communication over a public channel. It is related to the procedure de- scribed in [8], but is more efficient. In the idealized theory of entanglement-based quantum cryptography, Alice and Bob have a supply of qubit pairs, 2818 0031-9007y 96y 77(13) y2818(4)$10.00 © 1996 The American Physical Society

Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

  • Upload
    anna

  • View
    218

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

VOLUME 77, NUMBER 13 P H Y S I C A L R E V I E W L E T T E R S 23 SEPTEMBER1996

eyt

2818

Quantum Privacy Amplification and the Security of Quantum Cryptographyover Noisy Channels

David Deutsch,1 Artur Ekert,1 Richard Jozsa,2 Chiara Macchiavello,1 Sandu Popescu,3 and Anna Sanpera1

1Clarendon Laboratory, Department of Physics, University of Oxford,Parks Road, Oxford OX1 3PU, United Kingdom

2School of Mathematics and Statistics, University of Plymouth,Plymouth, Devon PL4 8AA, United Kingdom

3Department of Electrical, Computer and Systems Engineering, Boston University,Boston, Massachusetts 02215

(Received 26 April 1996)

Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noison the quantum communication channel. Although they become operable if they are supplemented bclassical privacy-amplification techniques, the resulting schemes are difficult to analyze and have nobeen proved secure. We introduce the concept of quantum privacy amplification and a cryptographicscheme incorporating it which is provably secure over a noisy channel. The scheme uses an“entanglement purification” procedure which, because it requires only a few quantum controlled-not and single-qubit operations, could be implemented using technology that is currently beingdeveloped. [S0031-9007(96)01288-4]

PACS numbers: 89.70.+c, 02.50.–r, 03.65.Bz, 89.80.+h

a-ureocaonin

ns

vene

teursineglehale-ennot.lyyhteesn

peroicthtoosh

tionrea-eney

ighyety ofm-y doomeuan-ingt isnge

ureusesh are.a

andrilyof

ven(see

edlo-

tionde-

tumrs,

Quantum cryptography [1–3] allows two parties (trditionally known as Alice and Bob) to establish a secrandom cryptographic key if, first, they have access tquantum communication channel, and second, theyexchange classical public messages which can be mtored but not altered by an eavesdropper (Eve). Ussuch a key, a secure message of equal length catransmitted over the classical channel. However, thecurity of quantum cryptography has so far been proonly for the idealized case where the quantum chanin the absence of eavesdropping, isnoiseless. That isbecause, under existing protocols, Alice and Bob deeavesdropping by performing certain quantum measments on transmitted batches of qubits and then ustatistical tests to determine, with any desired degreconfidence, that the transmitted qubits are not entanwith any third system such as Eve. The problem is tthere is in principle no way of distinguishing entangment with an eavesdropper (caused by her measuremfrom entanglement with the environment caused by incentnoise, some of which is presumably always presen

This implies that all existing protocols are, strictspeaking, inoperable in the presence of noise, since thequire the transmission of messages to be suspended wever an eavesdropper (or, therefore, noise) is detecConversely, if we want a protocol that is secure in the prence of noise, we must find one that allows secure tramission to continue even in the presence of eavesdropTo this end, one might consider modifying the existing ptocols by reducing the statistical confidence level at whAlice and Bob accept a batch of qubits. Instead ofastronomically high level envisaged in the idealized procol, they would set the level so that they would accept mbatches that had encountered a given level of noise. T

0031-9007y96y77(13)y2818(4)$10.00

ani-

gbee-dl,

cte-g

ofdt

ts)-

re-en-d.-

s-rs.-he-t

ey

would then have to assume that some of the informain the batch was known to an eavesdropper. It seemssonable that classical privacy amplification [4] could thbe used to distill, from large numbers of such qubits, a kin whose security one could have an astronomically hlevel of confidence [5]. However, no such scheme hasbeen proved to be secure. Existing proofs of the securitclassical privacy amplification apply only to classical comunication channels and classical eavesdroppers. Thenot cover the new eavesdropping strategies that becpossible in the quantum case: for instance, causing a qtum ancilla to interact with the encrypted message, storthe ancilla and later performing a measurement on it thachosen according to the data that Alice and Bob exchapublicly.

In this paper we present a protocol that is secin the presence of noise and an eavesdropper. Itentanglement-based quantum cryptography [2], but witnew element, an “entanglement purification” proceduThis allows Alice and Bob to generate a pair of qubits instate that is close to a pure, maximally entangled state,whose entanglement with any outside system is arbitralow. They can generate this from any supply of pairsqubits in mixed states with nonzero entanglement, eif an eavesdropper has had access to those qubitsalso [6,7]).

Our procedure—aquantum privacy amplificationalgo-rithm—(abbreviated as QPA algorithm) can be performby Alice and Bob at distant locations by a sequence ofcal operations which are agreed upon by communicaover a public channel. It is related to the procedurescribed in [8], but is more efficient.

In the idealized theory of entanglement-based quancryptography, Alice and Bob have a supply of qubit pai

© 1996 The American Physical Society

Page 2: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

VOLUME 77, NUMBER 13 P H Y S I C A L R E V I E W L E T T E R S 23 SEPTEMBER1996

ta

olir

na

rei

Othit

a

h

v

otu

ci

rsuit

rs

-

p

he

d

nal’orxt

not

cial

ity

s.

tthesity

fnt

a-isof

-

u-

oly

each pair being in the pure, maximally entangled sjf1l, where

jf6l ­1

p2

sj00l 6 j11ld ,

jc6l ­1

p2

sj01l 6 j10ld .(1)

These are the so-called “Bell states” which form a cvenient basis for the state space of a qubit pair. Aand Bob each have one qubit from each pair. In the pence of noise, each pair would in general have becometangled with other pairs and with the environment, awould be described by a density operator on the spspanned by (1).

Note that any two qubits that are jointly in a pustate cannot be entangled with any third physical objTherefore any algorithm that delivers qubit pairspure states must also have eliminated the entanglembetween any of those pairs and any other system.scheme is based on an iterative quantum algoriwhich, if performed with perfect accuracy, starting wa collection of qubit pairs in mixed states, would discasome of them and leave the remaining ones in stconverging tojf1l kf1j.

Our first departure from existing quantum cryptograpschemes is to assume that Evedoesinteract with all thequbits that are transmitted or received by either AliceBob. Indeed we analyze the scenario that is most faable for eavesdropping, namely where Eve herself islowed to prepare all the qubit pairs that Alice and Bwill subsequently use for cryptography. Any realistic siation would also involve environmental noise that is nunder Eve’s control, but this may be treated as a specase in which Eve is not using the full information avaable to her.

Suppose, then, that Eve has prepared two qubit paisome manner of her own choosing and sends one qfrom each pair to both Alice and Bob. Let the densoperators of the two pairs ber andr0, respectively. Aliceperforms a unitary operation

j0l !1

p2

sj0l 2 ij1ld , (2)

j1l !1

p2

sj1l 2 ij0ld (3)

on each of her two qubits; Bob performs the inveoperation

j0l !1

p2

sj0l 1 ij1ld , (4)

j1l !1

p2

sj1l 1 ij0ld (5)

on his. If the qubits are spin-12 particles and the compu

tation basis is that of the eigenstates of thez componentsof their spins, then the two operations correspond, restively, to rotations bypy2 and2py2 about thex axis.

te

n-cees-en-dce

ect.nenturm

hrdtes

ic

oror-al-b-

otial

l-

inbit

y

e

ec-

Then Alice and Bob each perform two instances of tquantum controlled-not operation

controljal

target

jbl !controljal

target

ja © bl sa, bd [ h0, 1j , (6)

where one pairsrd comprises the two control qubits anthe other onesr0d the two target qubits [9]. Alice andBob then measure the target qubits in the computatiobasis (e.g., they measure thez components of the targetsspins). If the outcomes coincide (e.g., both spins upboth spins down) they keep the control pair for the neround and discard the target pair. If the outcomes docoincide, both pairs are discarded.

To see the effect of this procedure, consider the specase in which each pair is in stater and the joint stateof the two pairs is the simple productr ≠ r. This casewill suffice for our applications. We express the densoperatorr in the Bell basishjf1l, jc2l, jc1l, jf2lj anddenote byhA, B, C, Dj the diagonal elements in that basiNote that the first diagonal elementA ­ kf1jrjf1l,which we call the “fidelity,” is the probability that thequbit would pass a test for being in the statejf1l. Thuswe wish to drive the fidelity to 1 (which implies thathe other three diagonal elements go to 0). Now, incase where the control qubits are retained, their denoperator r˜ will have diagonal elementshA, B, C, Djwhich depend on averageonly on the diagonal elements or (the average is taken over the two different coincideoutcomes, e.g., both spins up and both spins out):

A ­A21B2

N ,

B ­2CD

N ,

C ­C21D2

N ,(7)

D ­2ABN ,

whereN ­ sA 1 Bd2 1 sC 1 Dd2 is the probability thatAlice and Bob obtain coinciding outcomes in the mesurements on the target pair. That is, if the procedurecarried out many times on an ensemble of such pairspairs, thenA, B, C, andD give the average diagonal entries of the surviving pairs. Note that if the averageA isdriven to 1 then each of the surviving pairs must individally approach the pure statejf1l kf1j.

In passing, we note that if the two input pairs havedif-ferentstatesr andr0 with diagonal elementshA, B, C, DjandhA0, B0, C0, D0j, respectively, then the retained contrpairs will, on average, have diagonal elements given b

A ­AA01BB0

N ,

B ­C0D1CD0

N ,

C ­CC01DD0

N ,(8)

D ­AB01A0B

N ,

where N ­ sA 1 Bd sA0 1 B0d 1 sC 1 Dd sC0 1 D0d,which generalizes (7).

2819

Page 3: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

VOLUME 77, NUMBER 13 P H Y S I C A L R E V I E W L E T T E R S 23 SEPTEMBER1996

u

taatgw

if

h

ien

io

a

s

l

in

Ilita

eit

1y

E9

y

there

wse

nstyalem.an

reayeis

isted

st

heinenirsove

oftheTheer

dse.

a

wurentbe

Suppose that Eve has providedL pairs of qubits, withdensity operatorsr1, r2, . . . , rL. This is not to say thattheir overall density operator is necessarily of the prodform

r1 ≠ r2 ≠ · · · ≠ rL (9)

for Eve may have prepared them in an entangled sHowever, let us consider first the case in which the pare not entangled with each other, i.e., the overall sis of the form (9) above. Alice and Bob know nothinabout the state preparation, they are simply presentedan ensemble ofL pairs of qubits from which they can (they wish) estimate the average density operatorrave:

rave ­ 1L sr1 1 r2 1 · · · 1 rLd , (10)

which characterizes the ensemble of pairs.Alice and Bob now select pairs at random from t

ensemble of provided pairs and apply the QPA procedto pairs of these selected pairs. Thus we may setr ­rave in (7) and we are in effect studying the propertiesthe map 0BBB@

ABCD

1CCCA !

0BBB@ABCD

1CCCA ­1N

0BBB@A2 1 B2

2CDC2 1 D2

2AB

1CCCA . (11)

hA, B, C, Dj in (11) gives the average diagonal entrfor the states of the surviving pairs, i.e., the diagoentries of the average density operator of the ensemof surviving pairs. Therefore the repeated applicatof the QPA procedure—generating successive ensemof surviving pairs—corresponds to iteration of the min (11).

Several interesting properties of this map can be eaverified. For example, if at any stage the fidelityAexceeds1

2 , then after one more iteration, it still exceeds12 .

Although A does not necessarily increase monotonicaour target point,A ­ 1, B ­ C ­ D ­ 0, is a fixed pointof the map and is the only fixed point in the regionA .

12 .

It is a local attractor. We have been unable to obtaproof that it is also a global attractor in the regionA .

12 ,

but we have verified this by computer simulation.other words, if we begin with pairs whose average fideexceeds1

2 , but which are otherwise in an arbitrary sta(unentangled with each other), then the states of psurviving after successive iterations always convergethe unit-fidelity pure statejf1l. Since this is a pure statnone of the surviving pairs is, in the limit, entangled wany other system.

To illustrate the behavior of the iteration in Fig.we plot the fidelity as a function of the initial fidelitand the number of iterations, in cases whereA .

12 and

B ­ C ­ D initially.The above analysis applies to the case in which

does not entangle the pairs with each other [c.f. Eq. (

2820

ct

te.irsate

ith

eure

of

salblen

blesp

ily

ly,

a

ntyeirsto

,h

ve)].

FIG. 1. Average fidelity as a function of the initial fidelitand the number of iterations.

However, if Eve provides pairs whichare entangledwith each other, then Eq. (11) no longer holds, andQPA iterations may or may not converge to the pustate jf1l kf1j. Nevertheless it isnever of advantageto Eve to entangle pairs with each other: Eve knothat Alice and Bob will apply the QPA procedure to thdistributed pairs. In the course of the QPA iteratioAlice and Bob will periodically check the average fideliof the surviving pairs, which is achieved by purely locoperations and classical communication between thThus they determine whether they have achievedacceptably high fidelity. If Eve provides pairs which aentangle with each other then the QPA procedure mnot converge. In this case the protocol will force Alicand Bob to discard the entire transmission, and Evemerely in effect blocking the quantum channel. (Thwould also be the case if, for example, she distribupairs unentangled with each other, but havingA ,

12 .)

On the other hand, if Eve provides pairs whichdoconverge tojf1l kf1j (at an acceptable rate, i.e., at leathe rate corresponding to the starting values ofA, B,C, and D, which can be measured before starting tQPA procedure), then the QPA procedure is effectiveexcluding Eve despite the initial entanglement betwethe pairs. Thus Eve never benefits from providing pawhich are entangled with each other, and hence the abanalysis suffices to prove the security of the protocol.

The QPA procedure is rather wasteful in termsdiscarded particles—at least on half of the particles (ones used as targets) are lost at every iteration.efficiency of the procedure (i.e., the ratio of the numbof surviving pairs to the number of initial pairs) depenon the final fidelity required and on the initial statAs an example, in Fig. 2(a) we plot the efficiency asfunction of the initial fidelityA (taking B ­ C ­ D), forpurification to fidelity 0.99, and in Fig. 2(b) we shothe number of iterations used. The efficiency of oscheme compares very favorably with the entanglempurification scheme as described in [8], and it can

Page 4: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

VOLUME 77, NUMBER 13 P H Y S I C A L R E V I E W L E T T E R S 23 SEPTEMBER1996

oe

ri

b

n1b

lr

iethta

aty

eion

rp

o

iza-thenttalPA

iley.

areon-. isRe-

bez-

ms

J.d,ry

t-r,

s

s

her,

ys.

nt-nt-

s.

s.

nd

FIG. 2. States withB ­ C ­ D are purified up to a fidelityof 0.99. (a) The efficiency of the purification as a functionthe initial fidelity A. (b) The number of iterations used in thQPA procedure as a function of the initial fidelity.

directly applied to purify states which are not necessaof the Werner form [10].

Even though the efficiency of our procedure maylow in many cases, it nevertheless establishes that thexist unconditionally secure quantum key distributioprotocols. This is in contrast to recent claims [1that quantum bit commitment protocols can neverunconditionally secure.

The QPA procedure is capable of purifying a collectioof pairs in any stater of the product form (9), whoseaverage fidelity with respect to at least one maximaentangled state (i.e., a Bell state or a state obtained fa Bell state via local unitary operations) is greater than1

2(because any state of that type can be transformedjf1l via local unitary operations [12]). If we denotby B a class of pure, maximally entangled states (generalized Bell states) then the condition that the sr can be purified using the QPA procedure is

maxf[B

kfjrjfl .12 . (12)

Note that this condition is not equivalent to the Horodeccondition [13] characterizing mixed states which cviolate a generalized Bell inequality (CHSH inequali[14]). Indeed there exist mixed states which satisfybothour condition (12)and the CHSH inequalities. Thus thQPA algorithm reveals a more complete characterizatof nonlocality than that given by Bell’s theorem (c.f. als[6,7,15–17]). We hope to elaborate this in a forthcomipaper.

The practical implementation of the QPA proceduwould require efficient quantum controlled-not gates oerating directly on information carriers. Perhaps the mpromising implementation of gates of this type (in thQPA context) is the one proposed by Turchetteet al. [18].

f

ly

eere

]e

n

lyom

nto

ete

kin

on

g

e-

ste

It operates on polarized photons and allows the polartion of the target photon to be rotated depending onpolarization of the control photon. Although the curreefficiency of the device is quite low, recent experimenprogress in this field raises hopes for a successful Qexperiment in the not too distant future.

This research was supported in part by Elsag-BaPLC. We would like to thank A. Barenco and W. KWootters for stimulating discussions. A. E. and R. J.sponsored by The Royal Society, London. C. M. is spsored by the European Union HCM Programme. A. Ssponsored by U.K. Engineering and Physical Sciencessearch Council. A. E., R. J., and S. P. acknowledge Razana Grignolino d’Asti.

[1] C. H. Bennett and G. Brassard, inProceedings of theIEEE International Conference on Computers, Systeand Signal Processing, Bangalore, India, 1984(IEEE,New York, 1984), p. 175.

[2] A. K. Ekert, Phys. Rev. Lett.67, 661 (1991).[3] C. H. Bennett, Phys. Rev. Lett.68, 3121 (1992).[4] C. H. Bennett, G. Brassard, and J.-M. Robert, SIAM

Comput. 17, 210 (1988); C. H. Bennett, G. BrassarC. Crépeau, and U. M. Maurer, IEEE Trans. Inf. Theo41, 1915 (1995).

[5] H. K. Lo and H. F. Chau, Los Alamos Report No. quanph/9511025; D. Mayers,Lecture Notes in ComputeScience (Springer-Verlag, Berlin, 1995), Vol. 963pp. 124–135.

[6] M. Horodecki, P. Horodecki, and R. Horodecki, LoAlamos Report No. quant-ph/9605038.

[7] M. Horodecki, P. Horodecki, and R. Horodecki, LoAlamos Report No. quant-ph/9607009.

[8] C. H. Bennett, G. Brassard, S. Popescu, B. SchumacJ. Smolin, and W. K. Wootters, Phys. Rev. Lett.76, 722(1996).

[9] A. Barenco, D. Deutsch, A. Ekert, and R. Jozsa, PhRev. Lett.74, 4083 (1995).

[10] R. F. Werner, Phys. Rev. A40, 4277 (1989).[11] H. K. Lo and H. F. Chau, Los Alamos Report No. qua

ph/9603004; D. Mayers, Los Alamos Report No. quaph/9603015.

[12] C. H. Bennett and S. J. Wiesner, Phys. Rev. Lett.69, 2881(1992).

[13] R. Horodecki, P. Horodecki, and M. Horodecki, PhyLett. A 200, 340 (1995).

[14] J. Clauser, M. Horne, A. Shimony, and R. Holt, PhyRev. Lett.23, 880 (1969).

[15] S. Popescu, Phys. Rev. Lett.72, 797 (1994).[16] S. Popescu, Phys. Rev. Lett.74, 2619 (1995).[17] N. Gisin, Phys. Lett. A210, 151 (1996).[18] Q. A. Turchette, C. J. Hood, W. Lange, H. Mabuchi, a

H. J. Kimble, Phys. Rev. Lett.75, 4710 (1995).

2821