a look at a three state quantum key distribution protocol · outline 1 cryptography primer 2 a...

36
A Look at a Three State Quantum Key Distribution Protocol Jamie Batuwantudawe Institute for Quantum Computing University of Waterloo Canadian Students’ Quantum Information Conference, 2005 Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 1 / 36

Upload: others

Post on 12-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

A Look at a Three State Quantum Key DistributionProtocol

Jamie Batuwantudawe

Institute for Quantum ComputingUniversity of Waterloo

Canadian Students’ Quantum Information Conference, 2005

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 1 / 36

Page 2: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Outline

1 Cryptography Primer

2 A Quantum Approach

3 BB84 and B92

4 Entanglement Distillation Protocol

5 Three State Protocol

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 2 / 36

Page 3: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Outline

1 Cryptography Primer

2 A Quantum Approach

3 BB84 and B92

4 Entanglement Distillation Protocol

5 Three State Protocol

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 3 / 36

Page 4: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

What is Cryptography?

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 4 / 36

Page 5: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

What is Cryptography?

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 5 / 36

Page 6: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

One-Time Pad

EncryptionPLAINTEXT ⊕ KEY =⇒ CIPHERTEXT

DecryptionCIPHERTEXT ⊕ KEY = PLAINTEXT ⊕ KEY ⊕ KEY =⇒ PLAINTEXT

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 6 / 36

Page 7: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Security of the One-Time Pad

PLAINTEXT:

KEY:

CIPHERTEXT:

JAMIE

AEALD

KFMUI

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 7 / 36

Page 8: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Security of the One-Time Pad

PLAINTEXT:

KEY:

CIPHERTEXT:

HEATH

CALAA

KFMUI

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 8 / 36

Page 9: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

The Key Problem

Classical Key SchemesShamir’s No Key Protocol

Public Key Cryptography (ie. RSA)

Depend on unproved math problems!ie. Factoring, Discrete Log

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 9 / 36

Page 10: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Outline

1 Cryptography Primer

2 A Quantum Approach

3 BB84 and B92

4 Entanglement Distillation Protocol

5 Three State Protocol

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 10 / 36

Page 11: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

The No Cloning Theorem

TheoremGiven an arbitrary, unknown quantum state, there exists no validquantum operation that can produce a second, independentlymeasurable copy of the state.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 11 / 36

Page 12: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Non-orthogonal States

|0 >

|1 >

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 12 / 36

Page 13: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Non-orthogonal States

|0 >|− >= |0>−|1>√

2|+ >= |0>+|1>√

2

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 13 / 36

Page 14: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Outline

1 Cryptography Primer

2 A Quantum Approach

3 BB84 and B92

4 Entanglement Distillation Protocol

5 Three State Protocol

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 14 / 36

Page 15: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

BB84 and Unbiased Bases

B0 ={∣∣b0,0

⟩= |0〉 ,

∣∣b0,1⟩

= |1〉}

B1 ={∣∣b1,0

⟩= |+〉 ,

∣∣b1,1⟩

= |−〉}

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 15 / 36

Page 16: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

BB84

BB84 Protocol1 Alice randomly chooses binary strings, d (A) and t(A), each of

length 4n. The former holds Alice’s data bits and the latterdetermines Alice’s choices of bases.

2 Let d (A)i and t(A)

i denote the i th bits of string d (A) and t(A)

resepectively. For each i , Alice prepares the state∣∣∣b

t(A)i ,d (A)

i

⟩.

Alice sends all prepared states to Bob via the insecure quantumchannel.

3 Bob publicly announces, using the authenticated classicalchannel, when he has received all 4n qubits.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 16 / 36

Page 17: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

BB84

BB84 Protocol4 Bob randomly chooses a binary string t(B) of length 4n. Bob

measures the i th qubit in the Bt(B)i

basis. If the measurement yields∣∣∣bt(B)i ,0

⟩, Bob sets his corresponding data bit d (B)

i = 0.

Conversely, if the measurement yields∣∣∣b

t(B)i ,1

⟩, Bob sets his

corresponding data bit d (B)i = 1.

5 Alice publicly announces the string t(A), indicating the basis usedfor each qubit. Observe that it is too late for Eve to use thisinformation to affect the state she sends to Bob.

6 Alice and Bob, via public discussion, agree to discard the i th qubitif t(A)

i 6= t(B)i . 2n bits are expected to remain.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 17 / 36

Page 18: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

BB84

BB84 Protocol7 Alice randomly chooses half of the remaining data bits to be test

bits. Alice notifies Bob of the position of the test bits.8 Alice and Bob, via public discussion, compare the values of their

corresponding test bits. If the number of disagreements is toohigh, they abort the protocol.

9 If they continue the protocol, Alice and Bob perform errorcorrection and privacy amplification on the remaining n data bits tocreate a secure key.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 18 / 36

Page 19: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

B92

|+ >

|0 >

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 19 / 36

Page 20: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Outline

1 Cryptography Primer

2 A Quantum Approach

3 BB84 and B92

4 Entanglement Distillation Protocol

5 Three State Protocol

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 20 / 36

Page 21: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Using Entanglement

Entanglement Distillation ProtocolDistant parties share n “imperfect” EPR pairs

Use local operations and classical communication

Finally share m < n “perfect” EPR pairs

EPR pairs have perfect correlationsThird parties have no information about EPR pairs

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 21 / 36

Page 22: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

EDP QKD

EDP-based BB84

1 Alice prepares 2n Bell states, |00〉+|11〉√2

⊗2n

2 Alice randomly chooses a binary string b of length 2n. For the i th

Bell state, Alice performs a Hadamard operation on the secondqubit if bi , the i th bit of b, is 1. The random Hadamardtransformation hides information from Eve.

3 Alice sends the second half of each Bell state to Bob via theinsecure quantum channel.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 22 / 36

Page 23: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

EDP QKD

EDP Protocol4 Bob publicly announces, via the authenticated classical channel,

the reception of 2n qubits.5 Alice publicly announces the string b. Bob performs a Hadamard

transformation on his i th qubit if bi = 1. Observe that Eve cannotuse b to affect the qubit she passes along to Bob.

6 Alice randomly chooses half of the remaining data bits to be testbits. Alice notifies Bob of the position of the test bits.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 23 / 36

Page 24: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

EDP QKD

EDP Protocol7 Alice and Bob each measure their test bits in the computational

basis. Via public discussion, they compare the values of theircorresponding test bits. If the number of disagreements is toohigh, they abort the protocol.

8 If they continue the protocol, Alice and Bob agree on a quantumerror correcting code capable of correcting the number of errors intheir qubits.

9 Alice and Bob decode their states to perfect copies of |00〉+|11〉√2

.They each measure their halves in the computational basis tocreate a shared secret key.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 24 / 36

Page 25: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Security Proof of BB84

The Shor-Preskill ProofCan use CSS codes to seperate bit and phase error correction

Can use classical error correcting code for bit error correction

Can use classical hash functions for privacy amplification(corresponds to phase error correction)

Simply need to find upper bounds on number of bit and phaseerrors

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 25 / 36

Page 26: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Outline

1 Cryptography Primer

2 A Quantum Approach

3 BB84 and B92

4 Entanglement Distillation Protocol

5 Three State Protocol

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 26 / 36

Page 27: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

The Three States

|0〉

|1〉

|−〉 |+〉

6|ψ3〉

QQ

QQ

QQ

QQs

|ψ1〉

��

��

��

��+

|ψ2〉

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 27 / 36

Page 28: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

The Protocol

PBC001 Alice creates a large trit string r and a large bit string b, both of

length 3n. Each ri , the i th trit value of r , determines the alphabetto be used for the i th qubit. Each bi , the i th bit value of b, is the i th

classical bit that Alice tries to transmit to Bob.

Classical Quantum StateBit Alphabet 0 Alphabet 1 Alphabet 2

0 |ψ1〉 |ψ2〉 |ψ3〉1 |ψ2〉 |ψ3〉 |ψ1〉

Alice sends all prepared qubits to Bob through the quantumchannel.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 28 / 36

Page 29: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

The Protocol

PBC002 On each received qubit, Bob performs a measurement described

by the POVM{23

∣∣ ψ̄1⟩ ⟨

ψ̄1∣∣ , 2

3

∣∣ ψ̄2⟩ ⟨

ψ̄2∣∣ , 2

3

∣∣ ψ̄3⟩ ⟨

ψ̄3∣∣} (1)

Bob announces, using the public classical channel, when all of hismeasurements are done.

3 Alice announces the trit string r .4 Bob uses his measurement outcome and r to determine the raw

key.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 29 / 36

Page 30: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

The Protocol

PBC005 The expected number of bits remaining is 2n. Alice randomly

chooses half of these to be test bits. She publicly announces thepositions of her test bits. Alice and Bob publicly compare thevalues of their test bits. If the number of errors is greater than theprotocol’s threshold, they abort.

6 If they do not abort, they run classical error correction and privacyamplification protocols to generate share a secure secret key fromthe remaining bits.

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 30 / 36

Page 31: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Phase Error Estimation

For BB84, ebit = ephaseasymptotically since HXH = Z andHZH = X .

Not true for PBC00

Difficult to analyze because general attacks can add dependenceto errors.

For any individual qubit, the probability of a phase error is 54 the

probability of a bit error

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 31 / 36

Page 32: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Azuma’s Inequality

TheoremLet X0,X1, ...,XN be a martingale sequence (ie.E [Xi |Xi−1,Xi−2, ...,X0] = Xi−1) where |Xi − Xi−1| ≤ 1. Then, for allN ≥ 0 and any λ ≥ 0,

Pr [|XN − X0| ≥ λ] ≤ 2e−λ2

2N .

Can now show that ephase=54ebit

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 32 / 36

Page 33: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Key Generation Rates

BB84 :12

(1− 2h(ebit))

PBC00:1

2− ebit

(1− h(ebit)− h

(54

ebit

))

0 0.02 0.04 0.06 0.08 0.1 0.120

0.1

0.2

0.3

0.4

0.5

0.6Key Generation Rates vs. Bit Error Rates

Bit Error Rate, ebit

Key

Gen

erat

ion

Rat

e, S

BB84PBC00

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 33 / 36

Page 34: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Error Estimation from Inconclusive Results

Alice does not have to initially choose an alphabet. She couldrandomly send one of the three states and choose the alphabetlater - after Bob’s measurement.

One choice by Alice will lead to a good conclusive result.

The other choice will lead to an inconclusive result.

Since only Alice’s random choice of basis decides between goodconclusive and inconclusive, asymptotically they will appear inequal numbers, by the central limit theorem.

Result is that ebit = 2− 1pconclusive

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 34 / 36

Page 35: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

No Sampling

PBC00’s error estimation eliminates need for sampling

This is good, right?

What about sampling in BB84, B92?

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 35 / 36

Page 36: A Look at a Three State Quantum Key Distribution Protocol · Outline 1 Cryptography Primer 2 A Quantum Approach 3 BB84 and B92 4 Entanglement Distillation Protocol 5 Three State Protocol

Summary

PBC00 is an unconditionally secure three state protocol

Fewer states than BB84 might be good for implementations

Higher threshold than B92 is beneficial

Azuma’s inequality allows generalization of Shor-Preskill proof tomany QKD protocols

Possibly useful no-sampling feature

Jamie Batuwantudawe (IQC, UW) Three State QKD CS-QIC ’05 36 / 36