Institute of Physics (IOP), Bhubaneswar

Slides:



Advertisements
Similar presentations
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Advertisements

Classical capacities of bidirectional channels Charles Bennett, IBM Aram Harrow, MIT/IBM, Debbie Leung, MSRI/IBM John Smolin,
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Future Challenges in Long-Distance Quantum Communication Jian-Wei Pan Hefei National Laboratory for Physical Sciences at Microscale, USTC and Physikalisches.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Information Processing by Single Particle Hybrid Entangled States Archan S. Majumdar S. N. Bose National Centre for Basic Sciences Kolkata, India Collaborators:
Quantum Dense coding and Quantum Teleportation
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
The Classically Enhanced Father Protocol
Nawaf M Albadia
Efficiency of Multi-Qubit W states in Information Processing Atul Kumar IPQI-2014 IIT Jodhpur
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Antonio Acín
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Quantum Key Distribution in the GÉANT network
Lesson 2-18 AP Computer Science Principles
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Encryption and Integrity
Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
ICNFP, Kolymbari, Crete, Greece August 28 – September 5, 2013
Efficient Device-Independent Quantum Key Distribution
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Unconstrained distillation capacities of
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Invitation to Quantum Information III
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Bits and Bobs: The Quantum Theory of Information
CV Cryptography Using a Bidirectional Quantum Channel
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
Celia Li Computer Science and Engineering York University
Brandin L Claar CSE 597E 5 December 2001
Quantum Information with Continuous Variables
Quantum entanglement measures and detection
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Quantum Cryptography Scott Roberts CSE /01/2001.
The Security of Quantum Cryptography
Authenticated QKD protocol using one-time ID
Key Establishment Protocols ~
Information-Theoretic Security
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Introducing complex networks into quantum regime
Secure Diffie-Hellman Algorithm
A Link Layer Protocol for Quantum Networks
Presentation transcript:

Institute of Physics (IOP), Bhubaneswar 2017/3/21 ISCQI-2016 Institute of Physics (IOP), Bhubaneswar  Symmetric and Asymmetric Multiparty Quantum Communication Anindita Banerjee Department of Physics Centre of Astroparticle Physics and Space Science Bose Institute 1 QUANTUM CHANNEL QUANTUM CHANNEL AQD with G3 4C 1C 6C 6C 16 OPERATORS 2 OPERATORS 64 OPERATORS 64 OPERATORS CASE 4 CASE 5 CASE 6 CASE 1 CASE 2 CASE 3 QUANTUM CHANNEL QUANTUM CHANNEL 6C 5C 6C 2C 4 OPERATORS 32 OPERATORS QUANTUM CHANNEL QUANTUM CHANNEL 6C 6C 6C 3C 8 OPERATORS 64 OPERATORS QUANTUM CHANNEL QUANTUM CHANNEL MAX QD

Quantum communication 2017/3/21 Quantum communication Insecure (Teleportation, RSP and their controlled versions) Secure (QSS, QSDC , DSQC, QD) and its controlled versions 2

Secure quantum communication 2017/3/21 Secure quantum communication Quantum key distribution (QKD) Charles Bennett and Gilles Brassard 1984 A. K. Ekert 1991 L. Goldenberg and L. Vaidman 1995 Kak 3-stage protocol quantum cryptography 2006 Quantum key agreement (QKA) Weaker notion Stronger notion 3

Secure Direct quantum communication 2017/3/21 Secure Direct quantum communication Pong Ping Information flow QSDC Ping Pong Two way two step Bostrom and Felbinger in 2002 Cai and Li in 2004 (more efficient ) LM05 2005 (no entangled state) DLL 2003 One way two step Shukla C., Banerjee A., Pathak A., One way one step Int. J. Theor. Phys., vol. 52, pp. 1914-1924, 2013 DSQC Long and Liu (2002) Banerjee A., Pathak A., Phys. Lett. A, vol. 376, pp. 2944-2950, 2012. Shukla C., Banerjee A., And Pathak A., Int. J. Theor. Phys., vol. 52, pp. 1914-1924, 2013 QD 4

Quantum world Information flow Quantum telephone Quantum Dialogue 2017/3/21 Information flow Quantum world Quantum telephone Quantum Dialogue Quantum Conference

Quantum Dialogue Classical channel Quantum channel Bob’s Lab 2017/3/21 Quantum Dialogue B. A. Nguyen, Phys. Lett. A 328 (2004) 6. intercept-resend attack Classical channel Ba An 2005 Quantum channel Bob’s Lab Home photon Bob’s Lab measurement Alice’s Lab Travel photon time Source (Pics of Alice And Bob):http://perimeterinstitute.ca/videos/alice-and-bob

Generalized structure of QD 2017/3/21 Group-theoretic Approach & on Appropriate Quantum states Sufficient Condition Results Large no. of useful dense coding schemes Shukla C., Kothari V., Banerjee A., Pathak A., “On the Group-Theoretic Structure of a Class of Quantum Dialogue Protocols”, Phys. Lett. A, vol. 377, pp. 518-527, 2013. 7

How to form groups of unitary operators? 2017/3/21 Example: G2 is the group of order 16. Group multiplication table 8 8

Subgroups of G2 , G3 Example: Following are order 8, subgroups of G2 2017/3/21 Example: Following are order 8, subgroups of G2 Example: Following are order 32 ,subgroups of G3 9 9

Bell state Cluster state Higher number of state higher the encoding 2017/3/21 I CAN ENCODE 2 BITS I CAN ENCODE 2 BITS Bell state I CAN ENCODE 4 BITS I CAN ENCODE 4 BITS Cluster state Higher number of state higher the encoding

SYMMETRIC COMMUNICATION 2017/3/21 3 words How are you I am fine 3 words ASSYMMETRIC COMMUNICATION ASSYMMETRIC COMMUNICATION 3 words How are you fine 1 word

2017/3/21 Noise 12

2017/3/21 Bell state 2C 1C QUANTUM CHANNEL 1C 2C QUANTUM CHANNEL

4-qubit cluster state and Ω state 1C 4C 1C 4C QUANTUM QUANTUM CHANNEL 2017/3/21 1C 1C 4C 4C QUANTUM CHANNEL QUANTUM CHANNEL 14

AQD with G2 4C 1C 4C 2C 4C 3C 4C 4C CASE 1 CASE 2 CASE 3 2 OPERATORS 2017/3/21 AQD with G2 4C 2 OPERATORS 1C CASE 1 CASE 2 CASE 3 16 OPERATORS QUANTUM CHANNEL 4C 2C 4 OPERATORS QUANTUM CHANNEL 4C 3C 8 OPERATORS QUANTUM CHANNEL 4C 4C 16 OPERATORS QUANTUM CHANNEL MAX QD

AQD with G3 6C 1C 6C 2C 6C 3C 4C 6C 6C 5C 6C 6C CASE 1 CASE 2 CASE 3 2017/3/21 6C 1C 2 OPERATORS 64 OPERATORS CASE 1 CASE 2 CASE 3 QUANTUM CHANNEL 6C 2C 4 OPERATORS QUANTUM CHANNEL 6C AQD with G3 3C 8 OPERATORS QUANTUM CHANNEL 4C 6C 16 OPERATORS CASE 4 CASE 5 CASE 6 64 OPERATORS QUANTUM CHANNEL 6C 5C 32 OPERATORS QUANTUM CHANNEL 6C 6C 64 OPERATORS QUANTUM CHANNEL MAX QD

Direct QUANTUM communication 2017/3/21 So far ALL Direct QUANTUM communication Schemes USE COMMUNIATION!

Multi party communication 2017/3/21 Multi party communication A conference is a meeting of people to exchange ideas on a topic. Quantum conference (QC) is a multiparty secure quantum communication. Here the conversations by all the parties stays in the channel until the final measurement is done on the channel.

2017/3/21 Disjoint set

2017/3/21

Quantum conference -1 UA UA UB....UZ UA UB UA UB UC 2017/3/21 qd 21 UA UA UB UC......UZ qd UA UB UA UB UC UA UB UC 21

Leakage Success Probability of Eve = 1 / 2k 2017/3/21 Leakage For sending K bit by each party Operators required by each party = 2k Success Probability of Eve = 1 / 2k If we increase k then success probability will fall asymptotically Eve’s success probability rate can be reduced by (n = number of qubits) using multipartite entangled states. This leakage is not there in scheme 2. However the efficiency is reduced in scheme 2

2017/3/21 Quantum conference-2 Passing the parcel Qsdc based 23

INITIAL INFORMATION CAN BE SENT THROUGH QSDC 2017/3/21 Scheme 3 INITIAL INFORMATION CAN BE SENT THROUGH QSDC

2017/3/21

All QD can be converted to QKA 2017/3/21 All QD can be converted to QKA Following our sufficiency condition to construct Ba An-type protocol of QD, if we just encode the random sequence of bits in place of meaningful information on the quantum state, then we can convert all QD to QKA protocols. Quantum Inf. Process., (2014) DOI 10.1007/s11128-014-0784-0 26

If i can send messages securely 2017/3/21 If i can send messages securely why do i need to send key instead? Why QKA Sending few bits securely is different (in practice) than sending lots of bits securely .. ....... 27

Collaborators 2017/3/21

Thank you for your attention 2017/3/21 Thank you for your attention 29