Semi-Quantum Key Distribution with Limited Measurement Capabilities
Walter O. Krawec
Computer Science & Engineering Department University of Connecticut Storrs, CT USA Email: walter.krawec@gmail.com
ISITA 2018
Semi-Quantum Key Distribution with Limited Measurement Capabilities - - PowerPoint PPT Presentation
Semi-Quantum Key Distribution with Limited Measurement Capabilities Walter O. Krawec Computer Science & Engineering Department University of Connecticut Storrs, CT USA Email: walter.krawec@gmail.com ISITA 2018 Quantum Key Distribution
Computer Science & Engineering Department University of Connecticut Storrs, CT USA Email: walter.krawec@gmail.com
ISITA 2018
2
3
4
5
6
– Requires 18 different measurement
7
8
X Z Z
|0>, |1> |+>, |-> |0>, |1>
X Z
|0>, |1> |+> |0>, |1>
Original: New:
9
X Z Z
|0>, |1> |+>, |-> |0>, |1>
X Z
|0>, |1> |+> |0>, |1>
Original: New:
Interestingly, protocol is insecure if we only look at error rates – looking at mismatched measurements is necessary for security of this protocol!
10
[9] S. M. Barnett, B. Huttner, and S. J. Phoenix, “Eavesdropping strategies and rejected-data protocols in quantum cryptography,” Journal of Modern Optics, vol. 40, no. 12, pp. 2501–2513, 1993. [10] S. Watanabe, R. Matsumoto, and T. Uyematsu, “Tomography increases key rates of quantum-key distribution protocols,” Physical Review A, vol. 78, no. 4, p. 042316, 2008.
11
12
13
X Z
|0>, |1> |+> |0>, |1>
Eve
14
Forward Channel: Ignore (no noise) Reverse Channel, apply UR: X Z
|0>, |1> |+> |0>, |1>
UR
15
Forward Channel: Ignore (no noise) Reverse Channel, apply UR: X Z
|0>, |1> |+> |0>, |1>
UR
No detectable noise!
16
Forward Channel: Ignore (no noise) Reverse Channel, apply UR: X Z
|0>, |1> |+> |0>, |1>
UR
Linearity
17
Two Fixes:
X Z
|0>, |1> |+> |0>, |1>
UR
18
19
20
X Z
|0>, |1> |+> |0>, |1>
UR UF Eve is allowed to opportunities to probe the qubit:
0 >+|1,ei , j 1 >
Forward: Reverse:
21
X Z
|0>, |1> |+> |0>, |1>
UR UF Eve is allowed to opportunities to probe the qubit:
0 >+|1,ei , j 1 >
Forward: Reverse: Not necessarily normalized
22
0 ]+[e0,0 1 ])+ 1
0 ]+[e1,1 1 ])
0 ]+[e0,2 1 ])+ 1
0 ]+[e1,3 1 ])
Note:
23
0 ]+[e0,0 1 ])+ 1
0 ]+[e1,1 1 ])
0 ]+[e0,2 1 ])+ 1
0 ]+[e1,3 1 ])
0 |e0,0 0 >+<e1,3 1 |e1,3 1 >
0 |e0,0 0 >
0 |e0,0 0 >+< e1,3 1 |e1,3 1 >
1 |e0,0 1 >+< e1,3 0 |e1,3 0 >
1 |e0,0 1 >
1 |e0,0 1 >+<e1,3 0 |e1,3 0 >
1 |e1,1 1 >+< e0,2 0 |e0,2 0 >
1 |e1,1 1 >
1 |e1,1 1 >+<e0,2 0 |e0,2 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
0 |e1,1 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
Using a result in [5] allows us to bound:
24
0 |e0,0 0 >+<e1,3 1 |e1,3 1 >
0 |e0,0 0 >
0 |e0,0 0 >+< e1,3 1 |e1,3 1 >
1 |e0,0 1 >+< e1,3 0 |e1,3 0 >
1 |e0,0 1 >
1 |e0,0 1 >+<e1,3 0 |e1,3 0 >
1 |e1,1 1 >+< e0,2 0 |e0,2 0 >
1 |e1,1 1 >
1 |e1,1 1 >+<e0,2 0 |e0,2 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
0 |e1,1 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
Unlike past SQKD protocols, we can only bound these (based on the noise in the forward channel)
25
0 |e0,0 0 >+<e1,3 1 |e1,3 1 >
0 |e0,0 0 >
0 |e0,0 0 >+< e1,3 1 |e1,3 1 >
1 |e0,0 1 >+< e1,3 0 |e1,3 0 >
1 |e0,0 1 >
1 |e0,0 1 >+<e1,3 0 |e1,3 0 >
1 |e1,1 1 >+< e0,2 0 |e0,2 0 >
1 |e1,1 1 >
1 |e1,1 1 >+<e0,2 0 |e0,2 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
0 |e1,1 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
Function of ℜ<e0,0
0 |e1,3 1 >
26
A→B=<e0|e0>
X Z
|0>, |1> |+> |0>, |1>
UR UF
0 >+|1,ei , j 1 >
Forward: Reverse:
A→B=<e0,0 0 |e0,0 0 >+<e0,0 1 |e0,0 1 >
27
0 |e0,0 0 >+<e1,3 1 |e1,3 1 >
0 |e0,0 0 >
0 |e0,0 0 >+< e1,3 1 |e1,3 1 >
1 |e0,0 1 >+< e1,3 0 |e1,3 0 >
1 |e0,0 1 >
1 |e0,0 1 >+<e1,3 0 |e1,3 0 >
1 |e1,1 1 >+< e0,2 0 |e0,2 0 >
1 |e1,1 1 >
1 |e1,1 1 >+<e0,2 0 |e0,2 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
0 |e1,1 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
Bound based on p0,0
A→B=<e0,0 0 |e0,0 0 >+< e0,0 1 |e0,0 1 >
28
0 |e0,0 0 >+<e1,3 1 |e1,3 1 >
0 |e0,0 0 >
0 |e0,0 0 >+< e1,3 1 |e1,3 1 >
1 |e0,0 1 >+< e1,3 0 |e1,3 0 >
1 |e0,0 1 >
1 |e0,0 1 >+<e1,3 0 |e1,3 0 >
1 |e1,1 1 >+< e0,2 0 |e0,2 0 >
1 |e1,1 1 >
1 |e1,1 1 >+<e0,2 0 |e0,2 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
0 |e1,1 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
Similarly, we can look at:
A→B
29
0 |e0,0 0 >+<e1,3 1 |e1,3 1 >
0 |e0,0 0 >
0 |e0,0 0 >+< e1,3 1 |e1,3 1 >
1 |e0,0 1 >+< e1,3 0 |e1,3 0 >
1 |e0,0 1 >
1 |e0,0 1 >+<e1,3 0 |e1,3 0 >
1 |e1,1 1 >+< e0,2 0 |e0,2 0 >
1 |e1,1 1 >
1 |e1,1 1 >+<e0,2 0 |e0,2 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
0 |e1,1 0 >
0 |e1,1 0 >+<e0,2 1 |e0,2 1 >
Just leaves: ℜ< e0,0
0 |e1,3 1 >
30
A→ A=1−1
A→ A+ p1, R ,+ A→ A )
However, we show that techniques applying mismatched measurements for two-way semi-quantum protocols derived in [5] can be applied to this scenario. By looking at the error-rate in the “reflection” case, we find:
31
A→ A=1−1
A→ A+ p1, R ,+ A→ A )
However, we show that techniques applying mismatched measurements for two-way semi-quantum protocols derived in [5] can be applied to this scenario. By looking at the error-rate in the “reflection” case, we find: Needed to compute e.g.,
0 |e1,3 1 >
32
A→ A=1−1
A→ A+ p1, R ,+ A→ A )
However, we show that techniques applying mismatched measurements for two-way semi-quantum protocols derived in [5] can be applied to this scenario. By looking at the error-rate in the “reflection” case, we find: Mismatched Measurements – in a symmetric attack, these are ½ each
33
A→ A=1−1
A→ A+ p1, R ,+ A→ A )
However, we show that techniques applying mismatched measurements for two-way semi-quantum protocols derived in [5] can be applied to this scenario. By looking at the error-rate in the “reflection” case, we find: Functions of five different mismatched statistics (each). If symmetric attack, it holds that: η1=η2=0
34
1 |e0,0 1 >,<e1,3 1 |e1,3 1 >,<e0,2 1 |e0,2 1 >,< e1,1 1 |e1,1 1 >, L1, L2, L3, L4
<ei, j
k |ei , j k >≥0
<e0,0
1 |e0,0 1 >≤p0,0 A→ B
<e1,3
1 |e1,3 1 >≤ p1,1 A→B
<e0,2
1 |e0,2 1 >≤ p1,0 A→B
<e1,1
1 |e1,1 1 >≤p0,1 A→ B
| L1|≤√<e0,0
0 |e0,0 0 ><e1,3 1 |e1,3 1 >
| L2|≤√<e0,0
1 |e0,0 1 ><e1,3 0 |e1,3 0 >
| L3|≤√<e1,1
1 |e1,1 1 ><e 0,2 0 |e0,2 0 >
| L4|≤√<e1,1
0 |e1,1 0 ><e0,2 1 |e0,2 1 >
Restriction Reason Property of inner-product Unitarity of UR Cauchy-Schwarz p+, R ,-
A→ A=1−1
2 (L1+L2+L3+L4+η1+η2) −1 2 (p0,R ,+
A→ A + p1,R ,+ A→ A )
Mismatched Measurements
35
36
Q < 11% Independent: QX = 2Q(1-Q) Dependent: QX = Q Q < 7.9%
37
p0,0
A→ B
p0,1
A→ B
p1,0
A→ B
p1,1
A→ B
p+,R,-
A→ A
p+,0
A→ B
p+,1
A→ B
p0, R,+
A→ A
p1,R ,+
A→ A
p+,0,+
A→ A
p0,0,+
A→ A
p1,0,+
A→ A
p+,1,+
A→ A
p0,1,+
A→ A
p1,1,+
A→ A
Error Rates Mismatched Events
38
p0,0
A→ B
p0,1
A→ B
p1,0
A→ B
p1,1
A→ B
p+,R,-
A→ A
p+,0
A→ B
p+,1
A→ B
p0, R,+
A→ A
p1,R ,+
A→ A
p+,0,+
A→ A
p0,0,+
A→ A
p1,0,+
A→ A
p+,1,+
A→ A
p0,1,+
A→ A
p1,1,+
A→ A
Error Rates Mismatched Events While we only evaluated on a symmetric channel, our equations apply to arbitrary channels.
39
40
41
[2] M. Boyer, D. Kenigsberg, T. Mor. Quantum key distribution with classical Bob. PRL 99:140510, 2007 [5] W. O. Krawec, "Quantum key distribution with mismatched measurements over arbitrary channels," Quantum Information and Computation, vol. 17, pp. 209–241, 2017. [9] S. M. Barnett, B. Huttner, and S. J. Phoenix, “Eavesdropping strategies and rejected-data protocols in quantum cryptography,” Journal of Modern Optics, vol. 40, no. 12, pp. 2501–2513, 1993. [10] S. Watanabe, R. Matsumoto, and T. Uyematsu, “Tomography increases key rates of quantum-key distribution protocols,” Physical Review A, vol. 78, no. 4, p. 042316, 2008. [14] W. O. Krawec. Security proof of a semi-quantum key distribution protocol. In IEEE ISIT 2015, 686-690. [17] W. O. Krawec. Quantum key distribution with mismatched measurements over arbitrary channels. Quantum Information and Computation. 17 (3&4) 209-241. 2017. [21] N. Beaudry, M. Lucamarini, S. Mancini, and R. Renner. Security of two-way quantum key distribution. PRA 88(6)062302, 2013 [23] I. Devetak and A. Winter. Distillation of secret key and entanglement from quantum states. Proc. Royal Society A 461(2053) 207-235, 2005. [24] M. Berta, M. Christandl, R. Colbeck, J. Renes, R. Renner. The uncertainty principle in the presence of quantum memory. Nature Physics 6(9):659-662, 2010. [25] A. Winter. Tight uniform continuity bounds for quantum entropies: conditional entropy, relative entropy distance and energy constraints. Communications in Mathematical Physics. 347(1):291-313,2016.
42
and coin tossing. in Proc. IEEE Int. Conf. on Computers, Systems, and Signal
classical bob, in ICQNM.
distribution.
Quantum Information Processing, 13(11):2417-2436.
43
Quantum Information 6, 1195.
QKD protocols. Phys. Rev. A, 72:012332.
subsystems, Nat. Phys. 3, 645.
Quantum key distribution series network protocol with m-classical bobs, Chin. Phys. B 18, 2143.
key distribution using less than four quantum states. Phys. Rev. A, 79:052312.