1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
Quantum Key Distribution works like an unsophisticated candy machine Scott Shepard Louisiana Tech University.
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
Quantum Key Distribution Yet another method of generating a key.
Quantum Cryptography Marshall Roth March 9, 2007.
Future Challenges in Long-Distance Quantum Communication Jian-Wei Pan Hefei National Laboratory for Physical Sciences at Microscale, USTC and Physikalisches.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
GAP Optique Geneva University 1 Quantum Communications at telecom wavelengths Nicolas Gisin Hugo Zbinden Toni Acin, Claudio Bareiro, Sylvain Fasel, J.-D.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
The Classically Enhanced Father Protocol
Nawaf M Albadia
Marcos Curty 1,2 Coauthors: Tobias Moroder 2,3, and Norbert Lütkenhaus 2,3 1.Center for Quantum Information and Quantum Control (CQIQC), University of.
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
1 Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University.
Cryptography In the Bounded Quantum-Storage Model
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
Weak Value Assisted Quantum Key Distribution
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Information with Continuous Variables
Presentation transcript:

1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Joint work with: Xiongfeng Ma Kai Chen [Paper in preparation] Supported by CFI, CIPI, CRC program, NSERC, OIT, and PREA.

2 Center for Quantum Information & Quantum Control (CQIQC) University of Toronto Faculty: Paul Brumer, Daniel Lidar, Hoi-Kwong Lo, Aephraim Steinberg. Postdocs: ~10 Graduate Students: ~20 Visitors are most welcome!

3 Members of my group Faculty: Hoi-Kwong Lo Postdocs: Kai Chen° Kiyoshi Tamaki * Bing Qi Grad Students: Benjamin Fortescu, Fred Fung*, Leilei Huang*, Xiongfeng Ma, Jamin Sheriff*, Yi Zhao* Research Assistant: Ryan Bolen° * Joining this Fall ° Leaving this Fall

4 QUESTION: Is there a tradeoff between security and performance in a real-life quantum key distribution system ? General Consensus: YES. This Work: NOT NECESSARILY.

5 Killing two birds with one stone We present new QKD protocols that can, rather surprisingly, with only current technology: Achieve unconditional security---Holy Grail of Quantum Crypto. Surpass performance of all fiber-based experiments done in QKD so far. Conclusion: Security and Performance go hand in hand!

6 Outline 1.Motivation and Introduction 2.Problem 3.Our Solution and its significance Decoy state idea was first proposed in: W.-Y. Hwang, Phys. Rev. Lett., 91, (2003)

7 1.Motivation and Introduction

8 Commercial Quantum Crypto products available on the market Today! Distance over 100 km of commercial Telecom fibers. MAGIQ TECH. ID QUANTIQUE

9 Bad News (for theorists) Up till now, theory of quantum key distribution (QKD) has lagged behind experiments. Opportunity: By developing theory, one can bridge gap between theory and practice.

10 Theory and Experiment go hand in hand.

11 Key Distribution Problem AliceBob Eve Alice and Bob would like to communicate in absolute security in the presence of an eavesdropper, Eve. To do so, they need to share a common random string of number----key

12 Bennett and Brassard’s scheme (BB84) ASSSUMPTIONS: 1.Source: Emits perfect single photons. (No multi-photons) 2.Channel: noisy but lossless. (No absorption in channel) 3.Detectors: a) Perfect detection efficiency. (100 %) 4.Basis Alignment: Perfect. (Angle between X and Z basis is exactly 45 degrees.) Alice Bob Conclusion: QKD is secure in theory. Assumptions lead to security proofs: Mayers (BB84), Lo and Chau (quantum-computing protocol), Biham et al. (BB84), Ben-Or (BB84), Shor-Preskill (BB84), …

13 Reminder: Quantum No-cloning Theorem An unknown quantum state CANNOT be cloned. Therefore, eavesdropper, Eve, cannot have the same information as Bob. Single-photon signals are secure. aaa IMPOSSIBLE

14 Photon-number splitting attack against multi-photons A multi-photon signal CAN be split. (Therefore, insecure.) a a Bob Eve Splitting attack a a Alice Summary: Single-photon good. Multi-photon bad.

15 QKD : Practice Question: Is QKD secure in practice? 2.Channel: Absorption inevitable. (e.g. 0.2 dB/km) 3.Detectors: (a) Efficiency ~15% for Telecom wavelengths (b) “Dark counts”: Detectors will claim to have detected signals with some probability even when the input is a vacuum. 4. Basis Alignment: Minor misalignment inevitable. Reality: 1. Source: (Poisson photon number distribution) Mixture. Photon number = n with probability: Some signals are, in fact, double photons!

16 What type of security do we want? We consider unconditional security (paranoid security) and allow Eve to do anything allowed by quantum mechanics within a well-defined mathematical model. In particular, Eve has quantum computers, can change Bob’s channel property, detection efficiency and dark counts rate, etc, etc. Unconditional security is the Holy Grail of quantum crypto. We are as conservative as we possibly can.

17 Prior art on BB84 with imperfect devices 1.Inamori, Lutkenhaus, Mayers (ILM) 2.Gottesman, Lo, Lutkenhaus, Preskill (GLLP) GLLP: Under (semi-) realistic assumptions, if imperfections are sufficiently small, then BB84 is unconditionally secure. Question: Can we go beyond these results

18 2.Problem

19 Big Problem: Nice guys come last Alice: Problems: 1) Multi-photon signals (bad guys) can be split. 2) Eve may suppress single-photon signals (Good guys). Bob: Eve: Signature of this attack: Multi-photons are much more likely to reach Bob than single-photons. (Nice guys come last). Eve may disguise herself as absorption in channel. QKD becomes INSECURE as Eve has whatever Bob has.

20 Yield as a function of photon number Bob: Eve: Let us define Y n = yield = conditional probability that a signal will be detected by Bob, given that it is emitted by Alice as an n-photon state. For example, with photon number splitting attack: Y 2 = 1 : all two-photon states are detected by Bob. Y 1 = 0 : all single-photon states are lost.

21 Figures of merits in QKD Number of Secure bits per signal (emitted by Alice). How long is the final key that Alice and Bob can generate? (Maximal) distance of secure QKD. How far apart can Alice and Bob be from each other?

22 Prior Art Result Worst case scenario: all multi-photons sent by Alice reach Bob. Need to prove that some single photons,, still reach Bob. Consider channel transmittance η. Use weak Poisson photon number distribution: with average photon number μ = O (η). Secure bits per signal S = O (η 2 ).

23 Big Gap between theory and practice of BB84 Theory Experiment Key generation rate: S = O (η 2 ). S= O (η). Maximal distance: d ~ 40km. d >130km. Prior art solutions (All bad): 1)Use Ad hoc security: Defeat main advantage of Q. Crypto. : unconditional security. (Conservative Theorists unhappy .) 2)Limit experimental parameters: Substantially reduce performance. (Experimentalists unhappy .) 3)Better experimental equipment (e.g. Single-photon source. Low- loss fibers. Photon-number-resolving detectors): Daunting experimental challenges. Impractical in near-future. (Engineers unhappy .) Question: How to make everyone except eavesdroppers happy ?

24 (Recall) Problem: Photon number splitting attack Bob: Eve: Let us define Y n = yield = conditional probability that a signal will be detected by Bob, given that it is emitted by Alice as an n-photon state. For example, with photon number splitting attack: Y 2 = 1 : all two-photon states are detected by Bob. Y 1 = 0 : all single-photon states are lost. Yield for multi-photons may be much higher than single-photons. Is there any way to detect this?

25 A solution: Decoy State (Toy Model) Goal: Design a method to test experimentally the yield (i.e. transmittance) of multi-photons. Alice sends N two-photon signals to Bob. Alice and Bob estimate the yield Y 2 = x/N. If Eve selectively sends multi-photons, Y 2 will be abnormally large. Eve will be caught! Alice: N signals Bob: x signals Method: Use two-photon states as decoys and test their yield.

26 Procedure of Decoy State QKD (Toy Model). A) Signal state: Poisson photon number distribution μ (at Alice). B) Decoy state: = two-photon signals 1) Alice randomly sends either a signal state or decoy state to Bob. 2) Bob acknowledges receipt of signals. 3) Alice publicly announces which are signal states and which are decoy states. 4) Alice and Bob compute the transmission probability for the signal states and for the decoy states respectively. If Eve selectively transmits two-photons, an abnormally high fraction of the decoy state B) will be received by Bob. Eve will be caught.

27 Practical problem with toy model Problem: Making perfect two-photon states is hard, in practice Solution (Hwang): Make another mixture of good and bad guys with a different weight.

28 1)Signal state: Poisson photon number distribution: α (at Alice). Mixture 1. 2) Decoy state: Poisson photon number distribution: μ~ 2 (at Alice). Mixture 2 Hwang’s original decoy state idea W.-Y. Hwang, Phys. Rev. Lett., 91, (2003) If Eve lets an abnormally high fraction of multi-photons go to Bob, then decoy states (which has high weight of multi- photons) will have an abnormally high transmission probability. Therefore, Alice and Bob can catch Eve!

29 Drawback of Hwang’s original idea 1.Hwang’s security analysis was heuristic, rather than rigorous. 2.``Dark counts’’---an important effect---are not considered. 3.Final Results (distance and key generation rate) are unclear.

30 Can we make things rigorous? YES!

31 3.Our solution:

32 Experimental observation Yield: Error Rate: If Eve cannot treat the decoy state any differently from a signal state Y n (signal)=Y n (decoy), e n (signal)=e n (decoy) Y n : yield of an n-photon signal e n : quantum bit error rate (QBER) of an n-photon signal. N.B. Yield and QBER can depend on photon number only.

33 IDEA We propose that Alice switches power of her laser up and down, thus producing as decoy states Poisson photon number distributions, μ’s for all possible values of μ’s. Each μ gives Poisson photon number distribution: Try every Poisson distribution μ!

34 1.Making things rigorous (Combine with entanglement distillation approach in Shor-Preskill’s proof.) 2.Constraining dark counts (Using vacuum as a decoy state to constrain the “dark count” rate---probability of false alarm.) 3.Constructing a general theory (Infering all Y n, e n.) Conclusion: We severely limit Eve’s eavesdropping strategies. Any attempt by Eve to change any of Y n, e n ‘s will, in principle be caught. Our Contributions

35 Old Picture Theory Experiment Secure bits per signal: S = O (η 2 ). S= O (η). Maximal distance: d ~ 40km. d >130km. There is a big gap between theory and practice of BB84.

36 NEW Picture Theory Experiment Secure bits per signal: S = O (η). S= O (η). Maximal distance: d >130 km. d >130km. Security and performance go hand in hand.

37 Bonus The optimal average photon number μ of signal state can be rather high (e.g. μ = 0.5). Experimentalists usually take μ = 0.1 in an ad hoc manner. Using decoy state method, we can surpass current experimental performance. Conclusion: Better Theory Better Experiments

38 Compare results with and without decoy states The experiment data for the simulation come from the recent paper: C. Gobby, Z. L. Yuan, and A. J. Shields, Applied Physics Letters, (2004) Key parameters: Wavelength: 1550nm Channel loss: 0.21dB/km Signal error rate: 3.3% Dark count: 8.5*10 -7 per pulse Receiver loss and detection efficiency: 4.5% Error correction ineffiency: f(e)=1.22

39 Robustness of our results We found that our results are stable to small changes in: 1.Dark count probability (20% fluctuation OK) 2.Average photon number of signal states (e.g., OK) 3.Efficiency of Practical Error Correction Protocols. (A few percent OK)

40 Generality of our idea Our idea appears to be rather general and applies also to: 1)Open-air and ground to satellite QKD. 2)Other QKD protocols (e.g., Parametric down conversion based protocols). 3)Perhaps also testing in general quantum communication and quantum computing protocols.

41 Related Work Using another approach (strong reference pulse), another protocol (essentially B92) has recently been proven to be secure with R=O(η). [Koashi, quant-ph/ ] In future, it will be interesting to compare this approach with ours.

42 Summary 1.Decoy state BB84 allows: Secure bits per signal: O (η) where η : channel transmittance. Distance > 130km 2.Feasible with current technology: Alice just switches power of laser up and down (and measure transmittance and error rate). 3. Best of Both Worlds: Can surpass best existing experimental performance and yet achieve unconditional security.

43 Theory and Experiment go hand in hand.

44 THE END