quantum teleportation and bit commitment

69
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009

Upload: marla

Post on 21-Jan-2016

40 views

Category:

Documents


0 download

DESCRIPTION

Quantum Teleportation and Bit Commitment. Chi-Yee Cheung Chung Yuan Christian University June 9, 2009. What are teleportation and bit commitment? - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Quantum Teleportation and  Bit Commitment

Quantum Teleportation and Bit Commitment

Chi-Yee Cheung

Chung Yuan Christian University

June 9, 2009

Page 2: Quantum Teleportation and  Bit Commitment

What are teleportation and bit commitment?

(1) Teleportation: Arguably the most novel of all quantum protocols (procedures). It allows one to recreate an unknown quantum state at a remote site without physically transferring the quantum state itself.

Page 3: Quantum Teleportation and  Bit Commitment

(2) Bit commitment is a primitive (basic) two-party quantum protocol which can be use as the building block of other more complicated two-party protocols.

Two parties Alice and Bob…

Page 4: Quantum Teleportation and  Bit Commitment

What do these two protocols have in

common?

Before answering this question, I will have

to tell you something about density matrix

Page 5: Quantum Teleportation and  Bit Commitment

It is well know that for a pure statethe density matrix is simply given by

For a mixed state denoted by

then

Page 6: Quantum Teleportation and  Bit Commitment

Given a density matrix, there are always

Infinitely many different representations,

e.g.,

and etc.

Page 7: Quantum Teleportation and  Bit Commitment

Purification:

A mixed state in a Hilbert space

can always be written as a pure state

in a higher dimension Hilbert space

Such that

e.g., for the mixed state

Page 8: Quantum Teleportation and  Bit Commitment

If party-A applies an unitary transformation

on her states orthrononmal set

namely,

It is easy to show that the reduced density

matrix on B’s side remain unchanged.

*** It must be so, otherwise one could

transfer information instantaneously!

Page 9: Quantum Teleportation and  Bit Commitment

Theorem:

All representations of can be

generated in this manner.

Hughston, Jozsa, and Wooters

(Phys. Lett. A 183 (1993) 14.)

This property of mixed quantum states has been

found to be useful in discussions related to

teleportation, bit commitment.

Page 10: Quantum Teleportation and  Bit Commitment

Note that, although it is impossible for

party-A (Alice) to remotely change the

density matrix of party-B (Bob), it is

nevertheless possible for her to change the

representation of instantaneously at will!

All she has to do is apply an appropriate

transformation on the basis in her hand.

Page 11: Quantum Teleportation and  Bit Commitment

(1) Teleportation

Suppose Alice has an unknown quantum

state , and in addition she shares a

Bell (entangled) state with Bob:

Then she can use this quantum channel

to recreate at Bob’s site without

sending the particle itself.

Page 12: Quantum Teleportation and  Bit Commitment

It goes as follows:

where

and

Page 13: Quantum Teleportation and  Bit Commitment

Therefore If Alice makes a “Bell measurement”,

and tells Bob what she gets (say i=3 ), then Bob

will be able to recreate in his lab. by making

a compensating unitary transformation

Note that:

(1) The protocol is linear, that is,

could be part of a N-particle state, so that one can

teleport the whole N-particle state by repeating the

above process N times. Provided, of course, Alice

shares N pairs of Bell states with Bob,

Page 14: Quantum Teleportation and  Bit Commitment

(2) could be a mixed state. Since aswe have seen, any mixed state can be regarded as a pure state if one enlarges the Hilbert space.

Question: What if the given quantum channel cannot be written as a product of Bell states?

(i) How do we know if it could be used for teleportation?(ii) If so, how does one proceed?

Page 15: Quantum Teleportation and  Bit Commitment

There exists no general result in the

literature, and one just have to treat the

problem on a case by case basis.

For example, Zha and Song (Phys. Lett. A, 2007)

considered the teleportation of a 2-particle

state when the given channel is an

arbitrary state

(Alice: 1234; Bob: 56)

Page 16: Quantum Teleportation and  Bit Commitment

They found that the combined state can

always be recast in the form

From which they conclude that if is

unitary then Alice can teleport faithfully the

2-particle state. Otherwise, no.

Page 17: Quantum Teleportation and  Bit Commitment

Also, Yeo and Chua (Phys. Rev. Lett. 96 (2006) 060502)

found a class of so-called 4-particle genuinely

entangled states which cannot be recast into a

product of Bell states, but they can be used to

teleport faithfully arbitrary 2-particle state.

And there are others …1. P.X. Chen et al, PRA 74 (2006) 032324

2. J. Lee et al, PRA 66 (2002) 052318

3. G. Rigolin, PRA 71 (2005) 032303

4. P. Agrawal, PRA 74 (2006) 06232

5. S. Muralidharan et al, PRA 77 (2008) 032321

6. …

Page 18: Quantum Teleportation and  Bit Commitment

However, all of the results are not general,

in the sense that they work for some

specifically constructed quantum channels

only.

Page 19: Quantum Teleportation and  Bit Commitment

.

Page 20: Quantum Teleportation and  Bit Commitment
Page 21: Quantum Teleportation and  Bit Commitment
Page 22: Quantum Teleportation and  Bit Commitment
Page 23: Quantum Teleportation and  Bit Commitment
Page 24: Quantum Teleportation and  Bit Commitment
Page 25: Quantum Teleportation and  Bit Commitment
Page 26: Quantum Teleportation and  Bit Commitment
Page 27: Quantum Teleportation and  Bit Commitment

Note: (1) d is the number of unpolarized qubits in H_B (2) Local operations on H_B does not change the degree of entanglement between Alice and Bob.

Page 28: Quantum Teleportation and  Bit Commitment
Page 29: Quantum Teleportation and  Bit Commitment
Page 30: Quantum Teleportation and  Bit Commitment
Page 31: Quantum Teleportation and  Bit Commitment
Page 32: Quantum Teleportation and  Bit Commitment
Page 33: Quantum Teleportation and  Bit Commitment
Page 34: Quantum Teleportation and  Bit Commitment
Page 35: Quantum Teleportation and  Bit Commitment
Page 36: Quantum Teleportation and  Bit Commitment

Conclusion:

We have found a criterion which allows

one to judge if any given quantum

channel is good for faithful teleportation,

and if so, how many qubits can it teleport.

Page 37: Quantum Teleportation and  Bit Commitment

(2). Quantum bit commitment

QBC is a quantum cryptographic protocol involving two parties: Alice and Bob

They do not trust each other and they will do whatever it takes to gain an advantage!

Page 38: Quantum Teleportation and  Bit Commitment

The security of QBC is an important issue because it can be used as the building block of various other two-party quantum protocols, such as quantum coin tossing, etc.

QBC: Commitment + Unveiling

Page 39: Quantum Teleportation and  Bit Commitment

Commitment phase:

• Alice secretly commits to a bit b = 0 or 1, which is to be revealed to Bob at a later time.

• To ensure that Alice will not change her mind before unveiling, Alice and Bob execute a series of quantum and classical exchanges such that in the end, Bob has a quantum state in his hand.

Page 40: Quantum Teleportation and  Bit Commitment

Unveiling phase:

1. Alice reveals the value of b.

2. With some additional information from Alice, Bob uses to check whether Alice is honest.

Page 41: Quantum Teleportation and  Bit Commitment

Security issues:A QBC protocol is secure if it is

1. Binding: Alice cannot change her commitment without Bob’s knowledge.

2. Concealing: Bob cannot find out the value of b before Alice unveils it.

Page 42: Quantum Teleportation and  Bit Commitment

Concealing condition implies:

Ideal case

Non-ideal case

Page 43: Quantum Teleportation and  Bit Commitment

• Unconditional Security:

If the protocol remains secure even when A and B had capabilities limited only by the laws of nature.

(Security unaffected by any possible technological advances.)

Page 44: Quantum Teleportation and  Bit Commitment

Example (1):

1. Alice writes b on a piece of paper and locks it in a box.

2. She gives the box (but not the key) to Bob as evidence of her commitment.

Concealing: Bob cannot read the paperBinding: Paper is in Bob’s hand

Page 45: Quantum Teleportation and  Bit Commitment

(1) The box is hard to break(2) Bob cannot pick the lock(3) Etc….

How about QBC?

However classical BC cannot be unconditionally secure, because it’s security is always dependent on some unproven assumptions:

Page 46: Quantum Teleportation and  Bit Commitment

Example (2):

To commit, Alice sends Bob a sequence of qubits

Where

Page 47: Quantum Teleportation and  Bit Commitment

Binding:If Alice commits to b=0 initially, shecannot open as b=1, for if she did, her chance of success on each qubit is ½, therefore the overall chance of cheating successfully is exponentially small.

Concealing:

Page 48: Quantum Teleportation and  Bit Commitment

So naively, it seems that such a protocol is unconditionally secure!

Page 49: Quantum Teleportation and  Bit Commitment

•No-Go TheoremLo and Chau (1997), Mayers (1997)

If a protocol is concealing, it cannot be binding at the same time.

Unconditionally secure QBC is impossible as a matter of principle.

Page 50: Quantum Teleportation and  Bit Commitment

Main Idea of the Proof:

Purification – Alice leaves all undisclosed classical information undetermined at the quantum level by entangling with ancillas.

• Any action taken on a quantum system can be represented by an unitary transformation on system + environment (ancillas)

• Needs quantum computers.

Page 51: Quantum Teleportation and  Bit Commitment

At the end of commitment phase:

• Instead of a mixed state in

• There exists a pure state in

• HA is used to store Alice’s undisclosed info.

As long as

Bob cannot tell whether Alice purifies or not!

Purification

Page 52: Quantum Teleportation and  Bit Commitment

Then Alice has a perfect cheating strategy (EPR attack):

Because

Hence,

Page 53: Quantum Teleportation and  Bit Commitment

Notice: UA acts on HA only

Alice can execute it without Bob’s knowledge

Therefore Alice can unveil b=0 or b=1 at will.

Cheating!

(That is, the protocol is not binding!)

Page 54: Quantum Teleportation and  Bit Commitment

How does it work in example (2)?

Instead of honestly producing

She generates

Page 55: Quantum Teleportation and  Bit Commitment

That is, instead of fixing undisclosed information at the beginning, Alice leaves it undetermined at the quantum level. That is, recorded in ancillary qubit states.

Then she can cheat perfectly:

Page 56: Quantum Teleportation and  Bit Commitment

So it seems that unconditionally secure QBC is impossible!

Page 57: Quantum Teleportation and  Bit Commitment

Question: Does the “no-go theorem” cover all possible cases?

Note that QBC has a definite objective, but the corresponding procedure is not precisely defined.

There are infinitely many ways to do QBC.

So how could one be sure the no-go result is universally valid?

Page 58: Quantum Teleportation and  Bit Commitment

In the impossibility proof, in order that Alice knows UA, it is assumed that Alice knows every details of the protocol, so that no secret parameters exist.

* Secret Parameters

What if Bob is allowed to generate secret

parameters unknown to Alice?

Page 59: Quantum Teleportation and  Bit Commitment

The point is:

If the pure state depends on some parameter unknown to Alice?

Then

Page 60: Quantum Teleportation and  Bit Commitment

1. In general, depends on 2. But is not known to Alice, therefore

she cannot calculate 3. If so, then unconditionally secure QBC

might be possible (?)

The point is, the no-go theorem only proves the existence of , but there is no guarantee that it is known to Alice!

Page 61: Quantum Teleportation and  Bit Commitment

However, we find that for a concealing QBC protocol, the cheating unitary transformation

is independent of any secret parameter (probability distribution), , chosen by Bob.

(Purification is assumed to hold. In a purified approach, probability distributions are the only possible unknowns left.)

Page 62: Quantum Teleportation and  Bit Commitment

Proof:If Bob is allowed to choose from in secret, then he can purify his choices with an associated probability distribution

That is, instead of picking a particular ,

Page 63: Quantum Teleportation and  Bit Commitment

Where are orthonormal ancilla states.

Now the protocol is concealing. Therefore no matter what Bob uses, the resulting reduced density matrix must be independent of b

Bob entangles all his possible choices

Page 64: Quantum Teleportation and  Bit Commitment

Then there exists an such that

Since `s are orthogonal states in

Whereas acts on HA only.

Then it is easy to show that

Page 65: Quantum Teleportation and  Bit Commitment

Hence

Is independent of !

Hence we have proved that Alice can cheatperfectly whether Bob uses secret parametersor not.

Page 66: Quantum Teleportation and  Bit Commitment

*Conclusion

For a concealing QBC protocol, i.e.,

is independent of any of Bob’s secret choices, and Alice can calculate it without knowing them.

Page 67: Quantum Teleportation and  Bit Commitment

Therefore, even if Bob is allowed to generate secret parameters unknown to Alice, she can still cheat perfectly.

Our result enlarges the applicability of the no-go theorem to include cases where the parties are allowed to use parameters not known to each other.

Page 68: Quantum Teleportation and  Bit Commitment

Thank you!

Page 69: Quantum Teleportation and  Bit Commitment

• Lo and Chau: “In order that Alice and Bob can follow the procedures, they must know the exact forms of all unitary transformations involved“

• Mayers: “It is a principle that we must assume that every participant knows every detail of the protocol, including the distribution of probability of a random variable generated by another participant"