Top Banner
Masato Koashi (Osaka Univ, Creat, Sorst), Norbert Lütkenhaus (Univ. of Erlangen-Nürnberg, Max Pla nk Research Group), and Nobuyuki Imoto (Sokendai, Creat, Sorst, NTT) Unconditional Security of the B ennett 1992 quantum key-distrib ution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics * Collaboration with
22

Masato Koashi (Osaka Univ, Creat, Sorst) ,

Jan 01, 2016

Download

Documents

fuller-santana

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Kiyoshi Tamaki. *. *Perimeter Institute for Theoretical Physics. Collaboration with. Masato Koashi (Osaka Univ, Creat, Sorst) , - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Masato Koashi (Osaka Univ, Creat, Sorst), Norbert Lütkenhaus (Univ. of Erlangen-Nürnberg, Max Plank Research Gr

oup), and Nobuyuki Imoto (Sokendai, Creat, Sorst, NTT)

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over

a lossy and noisy channel

Kiyoshi Tamaki

*Perimeter Institute for Theoretical Physics

*

Collaboration with

Page 2: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Summary of my talk

• B 92 QKD Protocol

• Outline of the proof

• Examples of the security

• Summary and Conclusion.

Page 3: Masato Koashi (Osaka Univ, Creat, Sorst) ,

No Eve, noises and losses case (B92)

Alice

0encoder

1

Bob

or

Quantum Ch

Bob tells Alice whether the outcome is conclusiveor not over the public ch.

Alice and Bob share identical bit values !

?

?

1or

0

0,1: conclusive

Page 4: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Alice

0 encoder

Bob

or

0?

noise

The effects of noises or Eve

noise

noise

Eve

Noises, Eavesdropping → error, information leakage 

All noises are induced by Eve

For security

Page 5: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Security proof of the B92 protocol

An ideal photon counter that discriminates single photon one hand and multi-photon or single photon on the other hand.

Alice: A single photon source.

Assumptions on Alice and Bob

Is the B92 really unconditionally secure?

Bob:

Is the B92 secure against Eve who has unlimited computational power and unlimited technology for state preparations, measurements and manipulations?

Page 6: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Protocol 1 (Secure)

The B92

(Equivalent with respect to key distribution)

Key words: Error correction, Bell state, Entanglement distillation protocol (EDP)

Outline of the security proof of the B92

Page 7: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Alice Bob

Public ch

Entanglement Distillation Protocol (By CSS Code)

(by Shor and Preskill 2000)

Relative bit error position

Relative phase error positionSyndrome

measurementSyndrome

measurement

Error correction

pairs of a Bell stateSharing

Page 8: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Alice

Eve

Bob

Protocol 1 (Secure)

Broadcasting the filtering succeeded or not

Bit and phase error estimation

Quantum error correction

Single photon state

Page 9: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Error estimations on the Protocol 1

Alice

Eve

Test bits Test bits

Bob

Phase error rate and bit error rate is not independent

Phase error rate is estimated by bit error rate (the Protocol 1 is secure)

Page 10: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Protocol 1 (Secure)

The B92

(Equivalent with respect to key distribution)

Key words: Error correction, Bell state, Entanglement distillation protocol (EDP)

Outline of the security proof of the B92

Page 11: Masato Koashi (Osaka Univ, Creat, Sorst) ,

A brief explanation of the equivalence

Only the bit values are important

・ No need for phase error correction

Main Observation (by shor and Preskill)  

Alice and Bob are allowed to measure before .

Commute !Commute !

Page 12: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Alice Eve Bob

Protocol 1 (Secure)

Randomly chosen

EveClassical data processing(error correction, privacyamplification)

Classical data processing(error correction, privacyamplification)

Equivalent !

No need for phase error correction (Shor and Preskill)

Page 13: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Example of the security and estimation

: Optimal net growth rate of secret key per pulse

  : depolarizing rate

: the prob that Bob detects vacuum (Loss rate)

The vacuum state

: L = 0

: L = 0.2

: L = 0.5

Page 14: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Summary and conclusion

・ We have estimated the unconditionally security ofthe B92 protocol with single photon source and ideal photon counter.

・ We have shown the B92 protocol can be regarded as an EPP initiated by a filtering process.

・ Thanks to the filtering, we can estimate the phase error rate. Future study

・ Relaxation of the assumptions.

・ Security estimation of B92 with coherent state.

Page 15: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Derivation of the B92 measurement from that in the Protocol 1

Page 16: Masato Koashi (Osaka Univ, Creat, Sorst) ,

BobAlice

0

0

0

1

10

The phase error rate estimation from the bit error rate

Test bitsTest bits

0

0

1

01

1

gedanken gedanken

Note: It is dangerous to put some assumptions on the state.

Page 17: Masato Koashi (Osaka Univ, Creat, Sorst) ,

: subspace spanned by

: subspace spanned by

Nonorthogonal

The bit error and the phase error have a correlation !!

for givenUpper bound of

Qubit space

?

Page 18: Masato Koashi (Osaka Univ, Creat, Sorst) ,

σσ α α σ

Test bit Untested bit

σ σβ β β

α β

σ α σ α σ β

Consider any -qubit state that is symmetric under any permutation

σ α

σ β

For given , how much is

?

Question

For the estimation, we are allowed to regard the state as having stemmed from Independently and Identically Distributed quantum source !

ANS, the upper bound of

Page 19: Masato Koashi (Osaka Univ, Creat, Sorst) ,

: unitary operator corresponds to permutation of M qubit

M qubit state that is symmetric under any permutation

σσ α α σσ σβ β βσ α σ α σ β

Page 20: Masato Koashi (Osaka Univ, Creat, Sorst) ,

M qubit space can be decomposed as

: unitary operator corresponds to permutation of M qubit

M qubit state that is symmetric under any permutation

b=α

b=Β

j=1j=0

: number of qubits measuredin b basis

σσ α α σσ σβ β βσ α σ α σ β

Page 21: Masato Koashi (Osaka Univ, Creat, Sorst) ,

The class of the eavesdropping

Individual Attack

CoherentAttack(General Attack)

, , and Eve’s measurement is arbitrary.

・ ・

・ ・

Page 22: Masato Koashi (Osaka Univ, Creat, Sorst) ,

Quantum Key Distribution (QKD)

・ A way to share a random bit string between sender (Alice)and receiver (Bob) whose info leaks arbitrary small to Eve.

0100110101101

Alice Bob

0100110101101??Public Ch

Quantum Ch

Eve