NEAR-FUTURE APPLICATIONS of QUANTUM INFORMATION PROCESSING Dr. Tal Mor Department of Computer Science Technion- Israel Institute of Technology.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Economic Stimulus : Valorization of Single Photon Detectors and Quantum Key Distribution Systems Hugo Zbinden Group of Applied Physics (GAP), UNIGE NCCR.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Communication, Quantum Entanglement and All That Jazz Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering,
CS4600/5600 Biometrics and Cryptography UTC/CSE
Gagan Deep Singh GTBIT (IT) August 29,2009.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
A Security Approach In The Cloud Rick Rodin Dwight Bygrave Evgeni Sadovski Maria Azua DPS Class of 2012 – Team 2 1.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
1 Content IP-SECOQC – Consortium, Funding What is Quantum Cryptography? Project Goals / Project Structure Standard Related Issues: –In Quantum Key Distribution.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing and Nuclear Magnetic Resonance Jonathan Jones EPS-12, Budapest, August Oxford Centre for Quantum Computation
Quanum computing. What is quantum computation? New model of computing based on quantum mechanics. Quantum circuits, quantum Turing machines More powerful.
Quantum Convolutional Coding Techniques Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of.
Marcos Curty 1,2 Coauthors: Tobias Moroder 2,3, and Norbert Lütkenhaus 2,3 1.Center for Quantum Information and Quantum Control (CQIQC), University of.
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
1 Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Computers – Is the Future Here? Tal Mor – CS.Technion QIPA Dec ?? [ 2011 ; sold to LM ] D-Wave Two :512 ?? [ 2012 ; sold to NASA + Google.
As if computers weren’t fast enough already…
Quantum Cryptography Christian Schaffner
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Our Proposed Technique
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
Purdue University Spring 2016 Prof. Yong P. Chen Lecture 18 (3/24/2016) Slide Introduction to Quantum Photonics.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Le avventure di Alice, Bob & Eve nel mondo dei quanti Stefano Mancini Dipartimento di Fisica Università di Camerino.
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

NEAR-FUTURE APPLICATIONS of QUANTUM INFORMATION PROCESSING Dr. Tal Mor Department of Computer Science Technion- Israel Institute of Technology

Quantum Information Processing is very promising

Do we need to wait years for an application?

Do we really need to wait years for an application? Quantum Cryptography Unconditionally secure quantum key distribution (QKD) Many experimental groups implementing QKD, and obtaining a “secure” key… But is the key truly secure also in practice? Quantum Computation Algorithmic Cooling of Spins Short-term application: improved NMR spectroscopy [Long-term result: scalable NMR Quantum Computers]

Quantum Key Distribution ● Non-orthogonal quantum states ● No-cloning of such quantum states ● Information versus disturbance (Peres-Fuchs) →Unconditionally secure “practical” quantum key distribution (in theory) Biham, Boyer, Boykin, Mor and Roychowdhury (STOC’00) Mayers (J.ACM) ; Shor and Preskill (PRL)

Practical QKD But is the key truly secure also in practice??? Worldwide interest: various groups running practical QKD, performing amazing experiments Experimental Groups: J. Franson; N. Gisin; R. Hughes; P. Kwiat; E.Polzik; J. Rarity; A. Sergienko; A. Zeilinger… Companies: MAGIQ; BBN technologies; IBM; MITRE; NEC; MITSUBISHI; Idquantique; Qinetiq… Our (Technion) QKD team: Prof. Eli Biham, Prof. Meir Orenstein, Dr. Matty Katz, Mr. Oleg Izmerly

Attacks on QKD Far-future Attacks (require Quant. Comp) “Near”-future Attacks Photon Number Splitting (PNS) attacks G. Brassard, N. Lutkenhaus, T. Mor, and B. Sanders, (PRL, 2000) Ffffffffffffffffff Collective attacks C. Bennett, T. Mor, and J. Smolin (PRA, 1996) E. Biham and T. Mor (PRL, 1997) E. Biham, M. Boyer, G. Brassard, J. van-de-Graaf, and T. Mor (Algorithmica, 2002)

Attacking QKD protocols (1) Photons are sent from Alice to Bob; The final secret key is created from the transmitted key (the raw data) via error correction and privacy amplification; ● Collective attacks: Eve attaches a quantum probe to each transmitted photon (say, another photon, via a coupler), and measures these ancillary photons together, after learning all classical data, to learn optimal information on the final secret key.

Attacking QKD protocols (2) The transmitted data sometimes contains two photons per pulse; ● Photon Number Splitting (PNS) attacks: In PNS attacks, Eve keeps a photon from these two-photon pulses, and blocks most (or even all) single-photon pulses; If channel loss-rate is high, the legitimate users will not even notice… and Eve will get a lot (or even full) information.

Worldwide Status of Security Analysis of Practical QKD None of the practical protocols is proven secure. In particular, in November 2003: ● No practical scheme proven secure against Collective Attacks! ● No practical scheme proven secure against Photon Number Splitting Attacks! Are these attacks realistic in the near future?

Algorithmic Cooling of Spins Computer Science viewpoint Novel entropy manipulations techniques Nuclear Magnetic Resonance Enhanced Spin Polarization  Rapidly Increased Signal-to-Noise Ratio  Many potential applications Physics viewpoint A novel cooling mechanism

Potential Future Applications Enhanced Polarization  Improved Signal-to-Noise ratio Applications: ● Medical applications ● Monitoring brain activity (for instance, a lie detector) ● Identifying explosive materials ● Identifying narcotics ● Checking stability of materials exposed to severe conditions

Nuclear Magnetic Resonance Nuclei’s spins in a magnetic field Spin-half nucleus: a quantum bit

A Simple Logic Gate 1 C S A molecule with two spins  2-bit computer Manipulations of spins  a gate operating on bits Implementation of a gate: via a set of NMR pulses on a regular NMR machine

Magnetic Resonance: Polarization-Bias and Temperature

● Data compression: some spins can be cooled quite a lot (L. Schulman & U. Vazirani) using simple logical gates, while the rest of the spins get hotter ● The cold spins are pushed spatially to the edge of the molecule Polarization Enhancement (Cooling) ● Limited by Shannon’s bound on data compression ● Therefore impractical

Algorithmic Cooling 2. In addition to the computer bits, there are reset bits, namely spins that rapidly interact with the environment 3. Hot computer spins are “thermalized” via a SWAP with the reset spins (that can be re-used soon after) 4. The hot computer bits become colder. 5. The entire system is cooled 1. Data compression steps: ● This way Shannon’s bound is bypassed! Environment

Thermalization Reset bits “Algorithmic Cooling and Scalable NMR Quantum Computers” P. O. Boykin, T. Mor, V. Roychowdhury, F. Vatan, R. Vrijen (Proceedings of the National Academy of Science, 2002); Algorithmic Cooling is patent pending SWAP Wait Environment

We succeeded to cool down 2 Carbons to a low temperature of ~ 150 K 1 C 13 1 C H Before After Cooling by Thermalization G. Brassard, J. Fernandez, R. Laflamme, T. Mor, & Y. Weinstein (on preparation) Future goals: a full algorithmic cooling (with J. Fernandez)! Much lower temperatures!! Conceptual bounds on cooling (with L. Schulman)!!! Our (Technion) research team: Prof. H. Gilboa, Dr. Matty Katz, Dr. Yael Balazs, Mr. Yossi Weinstein TCE molecule

1 1 Summary 1. Practical QKD is not yet proven secure 2.Algorithmic Cooling is the first short-term application of quantum computing devices