Secret keys and random numbers from quantum non locality Serge Massar.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011.
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
GAP Optique Geneva University 1 Quantum Nonlocality: How does Nature do it? And what can we do with it? Nicolas Gisin GAP, University of Geneva, Switzerland.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Probability Theory Part 1: Basic Concepts. Sample Space - Events  Sample Point The outcome of a random experiment  Sample Space S The set of all possible.
Short course on quantum computing Andris Ambainis University of Latvia.
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Bell inequality & entanglement
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Spanish Cryptography Days, November 2011, Murcia, Spain Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Device-Independent.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
School of something FACULTY OF OTHER School of Physics and Astronomy FACULTY OF MATHEMATICAL AND PHYSICAL SCIENCES Nonlocality of a single particle Jacob.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
Physical Randomness Extractor Xiaodi Wu (MIT) device ……. Ext(x,s i ) Ext(x,0) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x uniform-to-all uniform-to-device.
Steering witnesses and criteria for the (non-)existence of local hidden state (LHS) models Eric Cavalcanti, Steve Jones, Howard Wiseman Centre for Quantum.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
Bell tests with Photons Henry Clausen. Outline:  Bell‘s theorem  Photon Bell Test by Aspect  Loopholes  Photon Bell Test by Weihs  Outlook Photon.
Violation of local realism with freedom of choice Faculty of Physics, University of Vienna, Austria Institute for Quantum Optics and Quantum Information.
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
Quantum randomness and the device-independent claim Valerio Scarani Acknowledgment: Singapore MoE Academic Research Fund Tier 3 MOE2012- T “Random.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Indefinite causal order in quantum mechanics Faculty of Physics, University of Vienna & Institute for Quantum Optics and Quantum Information, Vienna Mateus.
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Quantum Non-locality: From Bell to Information Causality Alex Thompson Physics 486 March 7, 2016.
QUANTUM OPTICS LAB IAP, UNIVERSITÄT BERN Qudit Implementations with Energy-Time Entangled Photons 1 Bänz Bessire Quantum Optics Lab – The Stefanov Group.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
Non-Locality and Communication Complexity Stefan Wolf Università della Svizzera italiana Darmstadt,
The device-independent outlook on quantum physics Definitions Part 1: History Part 2: self-testing Valerio Scarani.
Quantum nonlocality based on finite-speed causal influences
Entangled Electrons.
M. Stobińska1, F. Töppel2, P. Sekatski3,
Simulating entanglement without communication
ICNFP, Kolymbari, Crete, Greece August 28 – September 5, 2013
Efficient Device-Independent Quantum Key Distribution
Sequential sharing of nonlocal correlations
Presentation transcript:

Secret keys and random numbers from quantum non locality Serge Massar

Message of this talk: Quantum Information uses the weirdness of quantum mechanics to realise tasks impossible classicaly

Message of this talk: Quantum Information uses the weirdness of quantum mechanics to realise tasks impossible classicaly Device Independent approach uses the weirdness of quantum non locality to realise tasks impossible within the usual paradigm of quantum information. Device Independent: QKD Certified Random Number Generation Device Independent quantum state estimation Self Testing of Quantum Computers

Entanglement & Non Locality Device Independent: –Quantum Key Distribution –Random Number Generator –State Estimation –Self Testing of Quantum Computers Conclusion Summary of Talk

Entanglement and Aspect’s Experiment « Quantum Non Locality » D D Alice Bob D D

Entanglement and Aspect’s Experiment « Quantum Non Locality » D D Alice Bob D D X Input =Measurement SettingsY a Output=Measurement Outcomes b

D D Alice Bob D D X Input =Measurement SettingsY a Output=Measurement Outcomes b P(a b | X Y)= P( A’s outcome & B’s outcome | A’s measurement setting & B’s measurement setting )

P(a b | X Y) X=Alice’s setting a=Alice’s outcome Y=Bob’s setting b=Bob’s outcome Properties of Probabilities: No Signalling Conditions

Illustration: CHSH inequality 2 2√ √2 -4 LHV Quantum No Signaling D D Alice Bob D D

Geometric Picture 2 2√ √2 -4 LHV Quantum No Signaling quantum LHV Quantum No Signaling

4 Interpretations-4Models Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements No Signaling Information cannot travel faster than the speed of light Contradicts Experiments (Except for detection loophole)

4 Interpretations-4Models Quantum Mechanics Non Deterministic Outcomes of measurements not defined in advance No Signaling Information cannot travel faster than the speed of light Agrees with Observations «Quantum Non Locality»

4 Interpretations-4Models Non Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements Non Local The hidden variables are global. Information travels faster than c Contradicts Relativity Exponentially Inefficient

4 Interpretations-4Models Conspiracy Theories Everything is Predetermined No Freedom to Choose Measurement Settings No Free Will Contradicts the Locality of Physical Interactions Exponentially Inefficient ?

Implications for Crypto Quantum Mechanics Non Deterministic Outcomes of measurements not defined in advance No Signaling Information cannot travel faster than the speed of light Agrees with Observations «Quantum Non Locality» Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements No Signaling Information cannot travel faster than the speed of light Contradicts Experiments (Except for detection loophole) Non Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements Non Local The hidden variables are global. Information travels faster than c Contradicts Relativity Exponentially Inefficient ? Conspiracy Theories Everything is Predetermined No Freedom to Choose Measurement Settings No Free Will Contradicts the Locality of Physical Interactions Exponentially Inefficient ?

Observation of Non Locality & assume Validity of Quantum Mechanics Secure Labs (no signalling) Freedom to choose measurement settings Implies: →Measurement outcomes are random →Monogamy of correlations Some initial randomness is necessary. Locality Loophole does not need to be closed: Only require no signalling between Alice and Bob Can be replaced by weaker assumption: all correlations are no signalling. Application: Random Number Generator Application: Key Distribution Security depends only on correlations between inputs and outputs P(ab|XY) Device Independent

And the Experimental Situation ? !!!!!!!!!!!!!! Rate = mHz !!!!!!!!!!!!!!!

Quantum Key Distribution What about Security?

Practical QKD Beware of the hidden side channel Beware of inefficient detectors Solution: Device Independent Approach

Device Independent QKD Ekert 1991 Mayers and Yao 2004 Barrett Hardy and Kent 2005 Acín Brunner Gisin Massar Pironio and Scarani 2007 M. McKague, arXiv: Key Idea: Monogamy of Non Local Correlations

Device Independent QKD Key Idea: Monogamy of Non Local Correlations Security depends only on the correlations between inputs and outputs No hypothesis needed –on Hilbert space dimension –on workings of devices they could even be provided by an adversary

Device Independent QKD To make the concept practical: Theory needed: security proof when the same devices are used in succession Experiment needed: Non Locality Experiments with: –detection loophole closed –High data rate –Long Distance Communication Not necessary to close locality loophole !! –Security of Laboratories is Necessary for crypto –Security of Laboratories Sufficient to enforce No Signalling Could even be secure against Post-Quantum Adversary –Only require that No Signalling Conditions be Enforced.

Random Number Generators

Are RNG’s secure? -Are the bits random? (statistical tests only say that they look random) -Are they secret? (maybe the device has failed, is preprogramed)

Device Independent Random Number Generator Key Ideas: –Monogamy of Non Local Correlations P(abe|XYE)≈P(ab|XY)P(e|E) → adversary has no knowledge of a,b –Violation of a Bell inequality implies that outcomes a,b are random → new random numbers are generated Kollbeck, PhD thesis Pironio Acin Massar Boyer de la Giroday Matsukevich Maunz Olmschenk Hayes Luo Manning Monroe, submitted

Device Independent Random Number Generator Key Idea: –Monogamy of Non Local Correlations P(abe|XYE)≈P(ab|XY)P(e|E) → adversary has no knowledge of a,b –Violation of a Bell inequality implies that outcomes a,b are random → new random numbers are generated Even Secure Against Post Quantum adversary limited only by No-Signalling

Device Independent Random Number Generator Key Idea: –Monogamy of Non Local Correlations P(abe|XYE)≈P(ab|XY)P(e|E) → adversary has no knowledge of a,b –Violation of a Bell inequality implies that outcomes a,b are random → new random numbers are generated Randomness Expansion: –Most of the time choose X=Y=0 –From time to time test other settings → Use O(n Log n) random bits to produce O(n 2 ) new random bits

Experimental Demonstration Theory: takes into account possible memory of devices Use two ions in two traps separated by about 1m !!Not Necessary to close Locality Loophole!! Detection loophole closed

Experimental Demonstration Number of events n=3016 Data acquisition time: 1 month = new private random bits produced at 99% confidence level Theory: takes into account possible memory of devices Use two ions in two traps separated by about 1m !!Not Necessary to close Locality Loophole!! Detection loophole closed

Experimental Demonstration Number of events n=3016 Data acquisition time: 1 month = new private random bits produced at 99% confidence level Theory: takes into account possible memory of devices Use two ions in two traps separated by about 1m !!Not Necessary to close Locality Loophole!! Detection loophole closed For the first time, the randomness of a source can be certified by something more fundamental than statistical tests.

Device Independent State Estimation Observe: Task: Find Fidelity to Φ + state Find Entanglement of Formation of source as function of only ? X a ? Y b Bardyn Liew Massar McKague Scarani arXive:

Device Independent State Estimation Observe: Task: Find Fidelity to Φ + state Find Entanglement of Formation of source as function of only ? X a ? Y b

Dimension Witnesses ? X a ? Y b Brunner Pironio Acin Gisin Méthot Scarani 2008 Vertesi Pal arXiv: Briet Buhrman Toner arXiv: Observe: Violation of Bell inequality Task: Find Lower Bound on Dimension of Entangled State as function of violation of Bell inequality only

Self Testing of Quantum Computers Mayers Yao 2004 Magniez Mayers Mosca Ollivier 2006 First Quantum Computer Second Quantum Computer Repeatedly measure output Results of measurements Certify that computer output is correct ? ? Repeated Use of Unknown Quantum Computer, using Unknown Entanglement, with intermediate measurements can Certify that output of computation is correct.

Message of this talk: Use the weirdness of quantum non locality to realise tasks impossible within the usual paradigm of quantum information: Device Independent Quantum Key Distribution Certified Random Number Generation Quantum State Estimation Self Testing of Quantum Computers Overview: A. Ekert, Less Reality, More Security, Physics World, Sept 2009, pp