Experimental Bit String Generation Serge Massar Université Libre de Bruxelles.

Slides:



Advertisements
Similar presentations
Dov Gordon & Jonathan Katz University of Maryland.
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
The Round Complexity of Two-Party Random Selection Saurabh Sanghvi and Salil Vadhan Harvard University.
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
The Unique Games Conjecture with Entangled Provers is False Julia Kempe Tel Aviv University Oded Regev Tel Aviv University Ben Toner CWI, Amsterdam.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Oblivious Transfer based on the McEliece Assumptions
Quantum Key Distribution Yet another method of generating a key.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Oded Regev (Tel Aviv University) Ben Toner (CWI, Amsterdam) Simulating Quantum Correlations with Finite Communication.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
1 Privacy-Preserving Distributed Information Sharing Nan Zhang and Wei Zhao Texas A&M University, USA.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
A quantum protocol for sampling correlated equilibria unconditionally and without a mediator Iordanis Kerenidis, LIAFA, Univ Paris 7, and CNRS Shengyu.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Flipping coins over the telephone and other games.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Cryptography In the Bounded Quantum-Storage Model
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Antonio Acín
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Secret keys and random numbers from quantum non locality Serge Massar.
Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Weak Value Assisted Quantum Key Distribution
with Weak Measurements
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
CV Cryptography Using a Bidirectional Quantum Channel
Quantum Information with Continuous Variables
Quantum Information Theory Introduction
Presentation transcript:

Experimental Bit String Generation Serge Massar Université Libre de Bruxelles

Plan Recall earlier work on quantum coin tossing Theory of quantum bit string generation (joint work with Jonathan Barrett, PRA69(2004) and quant- ph ) Experimental implementation of bit string generation (L.-Ph. Lamoureux, E. Brainis, D. Amans, J. Barrett, S. M., quant- ph/ )

Coin Tossing (Blum) Two parties dont trust each other.They need to choose a random bit: –« Alice (in the USA) and Bob (in the EU) are divorcing, they need to decide who keeps the children. They decide to toss a coin. » Bit String Generation: Tossing many coins

Applications of coin tossing Divorce cases Cryptographic primitive Are there any good applications? –??Classically certified bit committement secure against polynomial quantum attack (Kent03)??

How to toss a coin? Trusted third party: YES Classical communication alone: NO Classical communication plus relativity: OK. (But each party needs to be in multiple locations) Quantum Communication: yes, to some extent.

Weak coin tossing: –Alice knows the outcome Bob wants –Bob knows the outcome Alice wants Strong coin tossing: –Alice and Bob do not know the outcome the other party wants. We will be concerned with Strong coin tossing

Bit commitment implies Coin Tossing Alice chooses a=0,1 at random Alice commits a to Bob Bob chooses b=0,1 at random Bob tells Alice the value of b Alice reveals the commitment Coin c=a+b mod 2

Quantum protocol based on imperfect bit commitment Alice chooses a=0,1 at random Commitment: –Alice sends |ψ a > to Bob – =cosθ Bob chooses b=0,1 at random. Bob tells Alice the value of b Alice reveals a Bob checks: –measures in basis |ψ a >, space orthogonal to |ψ a > –If outcome is |ψ a >, coin c=a+b mod 2 –If outcome orthogonal to |ψ a >, Bob aborts

Wining means getting the outcome you want. The protocol may abort. If the protocol aborts, everybody looses Classical communication: either Є A or Є B = ½ There exists a quantum protocol with Є A = Є B = ¼ (Ambainis) For all quantum protocols, Є> 1/√2 – ½ (Kitaev)

Alice cheats Alice does not choose a Commitment: –Alice sends |ψ>=N(|ψ 0 > + |ψ 1 >) to Bob – =cosθ Bob chooses b=0,1 at random. Bob tells Alice the value of b Alice reveals a chosen so that b+a has the desired value Bob checks: –measures in basis |ψ a >, space orthogonal to |ψ a > –Alice hopes outcome is |ψ a >, then: coin c=a+b mod 2 Alice wins –If outcome orthogonal to |ψ a >, Bob aborts It is easy for Alice to cheat if =cosθ is SMALL

Bob cheats Alice chooses a=0,1 at random Commitment: –Alice sends |ψ a > to Bob – =cosθ Bob tries to learn whether a=0 or a=1: –He measures the state –He chooses b so that if his measurement outcome was correct, he wins: b+a has the desired value Bob tells Alice the value of b Alice reveals a Hopefully Bob has won (if his measurement outcome gave the correct value of a) It is easy for Bob to cheat if cosθ is LARGE

One can choose an optimal value of =cosθ=1/√2 so that neither Alice nor Bob can cheat too much. Then

Bit String Generation Alice and Bob want to generate a string of n bits c1, c2, …, cn –A. Kent (2003) noted that this should be easier than tossing a single coin. Proposed a protocol based on the parties sharing many singlets. No security analysis.

Present work Bit string generation based on n repetitions of above protocol for coin tossing. Detailed security analysis.

1) Classical Protocol for bit string generation Best classical protocol we have found (optimal for some security criteria) –Alice chooses the value of half the bits –Bob chooses the value of the other half Thus if Alice is dishonest, Bob honest, half the bits are random, half are fixed.

For i=1 to n Alice chooses a i =0,1 at random Commitment: –Alice sends |ψ ai > to Bob – =cosθ Bob chooses b i =0,1 at random. Bob tells Alice the value of b i. Alice reveals the value of a i to Bob Bob checks: –measures in basis |ψ ai >, space orthogonal to |ψ ai > –If outcome orthogonal to |ψ a >, Bob aborts Next i If Bob has not aborted, c i =a i + b i mod 2 2) Quantum Protocol

Cheating 1 Cheating Bob: –He must measure the states received from Alice immediately → Same security analysis than when tossing a single coin. Cheating Alice: –She can send an entangled state, measure her state, then decide on the value of ai depending on the measurement outcome. –She can correlate/entangle her strategy between rounds

Cheating 2 For fixed =cosθ it is more and more difficult for Alice to cheat when n increases (since Bob carries out n measurements) → One can decrease θ as n increases This makes it more and more difficult for Bob to cheat Optimal rate of decrease θ=n - α for some α →Good security both with respect to Alice and Bob

Security Criteria: Average Bias

Security Criteria: Entropy

Security criteria: Min Entropy

Summary Open Questions: Improve quantum results. (Can entanglement help?) Obtain Kitaev type bounds for the different security criteria. Prove classical conjecture.

Experimental Bit String Generation Easier than tossing a single coin because some experimental imperfections (detector efficiency, detector dark counts) can be subtracted. –Experiment reported by Zeilinger et al (quant- ph/ ) but incomplete security analysis. –Our experiment: we did our best to prove security against ALL attacks by a dishonest party.

Experimental imperfections: –Alice’s state preparation may be noisy –The communication line may be noisy –Bob’s measurement apparatus may be imperfect A dishonest party can controle everything outside the other party’s lab. Thus in the presence of imperfections, the guaranteed bounds on randomness will be worse Alice’s Lab Bob’s Lab Communication line

For i=1 to n Alice chooses a i =0,1 at random Commitment: –Alice sends |ψ ai > to Bob – =cosθ Bob chooses b i =0,1 at random. Bob tells Alice the value of b i. Alice reveals the value of a i to Bob Bob checks: –estimates fidelity of states sent by Alice: measures in basis |ψ ai >, space orthogonal to |ψ ai > Next i If fidelity too small, Bob aborts If fidelity sufficiently large, Bob does not abort and c i =a i + b i mod 2 Quantum Protocol with imperfections

Important parameters: –Scalar product =cosθ between states prepared by Alice –Fidelity f of states as estimated by Bob. Bounds on ε B, H B depend on θ only. Bounds on ε A, H A depend on f and θ, for instance: Thus choose good compromise between =cosθ and fidelity f Security Analysis

Implementation |ψ 0 >=|+α>, |ψ 1 >=|-α> are two coherent states (by changing the intensity |α| 2, one changes the overlap =exp[-2|α| 2 ]) Bob’s measurement: – displaces the states by D ±α –Uses a single photon detector to check that the state is the vacuum. –If the detector clicks, then Alice could be cheating Notes: Displacement is simply realised by an interferometer No need to restrict Hilbert space to single photon subspace x p |α>|α> |-α> x p |α>|α> |0>=D -α |α>

Experimental setup All fiber optics Telecommunication wavelenghts Based on « plug an play » system for quantum key distribution (N. Gisin) →suitable for long distance communication (our realisation: table top)

Security Complication: – Light pulses produced by Bob, then go to Alice, then reflected back to Bob Remark: upon attenuation, any state tends towards a mixture of coherent states Typically A=10 4 Attenuation A Gaussian Noise 1/A Arbitrary state Mixture of coherent states (positive P function)

Security Solution: first measure intensity, then attenuate: this produces a mixture of coherent states of known intensity A Classical Detector Mixture of coherent states of known intensity Intensity known

Experimental Results Different choices of |α|, hence of =exp[-2|α| 2 ] Curves assume a visibility v=97% (but it is sometimes worse) Number of coins tossed n=10 4 All classical protocols have ε A + ε B ≥0.5 All classical protocols have (H A + H B )/n ≤1 (conjecture)

Summary Using quantum communication it is possible to generate very random strings of bits in the absence of noise. In the presence of imperfections the randomness goes down. Nevertheless experimental demonstration of bit strings generation using quantum communication (bits are more random than can be achieved using classical communication, at least according to the average bias criterion).

Outlook improve theoretical bounds, Improve experiment: –toss a single coin more random than possible using classical communication; –long distance bit string generation

Collaborators: –Jonathan Barrett –Louis-Philippe Lamoureux –Edouard Brainis –David Amans Funding and Support: –Université Libre de Bruxelles (ULB) –Fonds National de la Recherche Scientifique (FNRS) –Communauté Française de Belgique (ARC) –Gouvernement Fédéral Belge (PAI) –European Community (project RESQ)