1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.

Slides:



Advertisements
Similar presentations
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Advertisements

Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 11 (2005) Richard Cleve DC 3524
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Short course on quantum computing Andris Ambainis University of Latvia.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Introduction to Quantum Information Processing Lecture 4 Michele Mosca.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Computer Security CS 426 Lecture 3
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
8. Data Integrity Techniques
Applied Cryptography Spring 2015 Digital signatures.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 20 (2009)
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Overview of Cryptography & Its Applications
Nawaf M Albadia
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Topic 36: Zero-Knowledge Proofs
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Quantum Cryptography Scott Roberts CSE /01/2001.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Presentation transcript:

1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course web site at: Lecture 20 (2005)

2 Contents Recap: Schmidt decomposition The story bit commitment Another key distribution protocol that is easy to analyze (but hard to implement)

3 Recap: Schmidt decomposition The story bit commitment Another key distribution protocol that is easy to analyze (but hard to implement)

4 Schmidt decomposition Let  be any bipartite quantum state:  = Eigenvectors of Tr 1  Then there exist orthonormal states  1 ,  2 , …,  m  and  1 ,  2 , …,  m  such that  = With respect to the above bases, the state “looks” like:  =

5 Schmidt decomposition: proof (I) The density matrix for state  is given by  Tracing out the first system, we obtain the density matrix of the second system,  = Tr 1  Since  is a density matrix, we can express  =, where  1 ,  2 , …,  m  are orthonormal eigenvectors of  Now, returning to , we can express  =, where  1 ,  2 , …,  m  are just some arbitrary vectors (not necessarily valid quantum states; for example, they might not have unit length, and we cannot presume they’re orthogonal) We will next show that  c  c′  = p c if c = c′ 0 if c  c′

6 Schmidt decomposition: proof (II) The claimed result about  c  c′  now follows To show that  c  c′  = p c if c = c′ 0 if c  c′, we compute the partial trace Tr 1 of  in terms of A careful calculation (shown later) of this partial trace yields which must equal Next, setting completes the construction

7 Schmidt decomposition: proof (III) For completeness, we now give the “careful calculation” of (by definition of Tr 1 ) (linearity & properties of  ) (definition of Tr ) (since Tr(AB) = Tr(BA) )

8 Recap: Schmidt decomposition The story bit commitment Another key distribution protocol that is easy to analyze (but hard to implement)

9 Bit-commitment Alice has a bit b that she wants to commit to Bob: After the commit stage, Bob should know nothing about b, but Alice should not be able to change her mind After the de-commit stage, either: –Bob should learn b and accept its value, or –Bob should reject Alice’s de-commitment message, if she deviates from the protocol commit stagede-commit stage bit b

10 Simple physical implementation Commit: Alice writes b down on a piece of paper, locks it in a safe, sends the safe to Bob, but keeps the key De-commit: Alice sends the key to Bob, who then opens the safe Desirable properties: –Binding: Alice cannot change b after commit –Concealing: Bob learns nothing about b until de-commit Question: why should anyone care about bit-commitment? Answer: it is a useful primitive operation for other protocols, such as coin-flipping, and “zero-knowledge proof systems”

11 Complexity-theoretic implementation Based on a one-way function* f : {0,1} n  {0,1} n and a hard-predicate h : {0,1} n  {0,1} for f Commit: Alice picks a random x  {0,1} n, sets y = f ( x ) and c = b  h ( x ) and then sends y and c to Bob De-commit: Alice sends x to Bob, who verifies that y = f ( x ) and then sets b = c  h ( x ) This is (i) perfectly binding and (ii) computationally concealing, based on the hardness of predicate h * should be one-to-one

12 Quantum implementation Inspired by the success of QKD, one can try to use the properties of quantum mechanical systems to design an information-theoretically secure bit-commitment scheme One simple idea: –To commit to 0, Alice sends a random sequence from {  0 ,  1  } –To commit to 1, Alice sends a random sequence from {  + ,  −  } –Bob measures each qubit received in a random basis –To de-commit, Alice tells Bob exactly which states she sent in the commitment stage (by sending its index 00, 01, 10, or 11), and Bob checks for consistency with his measurement results A paper appeared in 1993 proposing a quantum bit- commitment scheme and a proof of security

13 Quantum implementation Not only was the 1993 scheme shown to be insecure, but it was later shown that no such scheme can exist! To understand the impossibility proof, recall the Schmidt decomposition: [Mayers ’96][Lo & Chau ’96] Let  be any bipartite quantum state:  = Then there exist orthonormal states  1 ,  2 , …,  m  and  1 ,  2 , …,  m  such that  = Eigenvectors of Tr 1 

14 Quantum implementation Corollary: if  0 ,  1  are two bipartite states such that Tr 1  0  0  = Tr 1  1  1  then there exists a unitary U (acting on the first register) such that (U  I )  0  =  1  Proof: Protocol can be “purified” so that Alice’s commit states are  0  &  1  (where she sends the second register to Bob) By applying U to her register, Alice can change her commitment from b = 0 to b = 1 (by changing  0  to  1  ) and We can define U so that U  c  =  c  for c = 1,2,..., m █

15 Recap: Schmidt decomposition The story bit commitment Another key distribution protocol that is easy to analyze (but hard to implement)

16 Recap of BB84 Alice sends a string of these “BB84” states to Bob Note: Eve may see these qubits (and tamper with them) After receiving each qubit, Bob randomly chooses a basis and measures in it Then Alice and Bob communicate on the non-private (but authenticated) classical channel to distill a good private key Shown to be doable if “error rate” is less that 11%, and the system can abort otherwise  00  =  0   10  =  1   01  =  +  =  0  +  1   11  =  −  =  0  −  1   00   10   01   11 

17 Properties of  0  0  +  1  1  The Bell state  +  =  0  0  +  1  1  has the following properties: Therefore, (c) if both qubits are measured in the Hadamard basis the results will agree (a) if both qubits are measured in the computational basis the results will agree (b) it does not change if H  H is applied to it Moreover,  +  is the only two-qubit state that satisfies properties (a) and (c) Question: Why?

18 Key distribution protocol based on  +  Preliminary idea: Alice creates several  +  states and sends the second qubit of each one to Bob If they knew that that they possesed state  +  + ...  +  then they could simply measure each qubit pair (say, in the computational basis) to obtain a shared private key This is because there is no additional information that Eve can possess to predict the random outcome of the measurement—knowing they have  +  + ...  +  is of no help (and that’s the most that can be known about the state before it is measured)

19 Testing whether states are  +  The difficulty is that Eve can intercept the qubits that Alice sends to Bob, and possibly change them Alice and Bob can use the properties of  +  to test whether the qubits are actually in this state are in this state They can measure in the computational or Hadamard basis (but not both!) and check whether their results agree using the public channel

20 Testing whether states are  +  We might as well assume that Eve is supplying the qubits to Alice and Bob, who simply test whether they’re  +  Alice and Bob choose a random subset of their qubits to perform the test on (note that the states which they check become ruined for the purposes of generating the key, since their messurement outcoes are disclosed publicly) Moreover, for each pair tested, only one of the two measurements can be performed For each of their chosen qubits, Alice and Bob randomly decide which of the two measurements to perform

21

22 Private communication Suppose Alice and Bob would like to communicate privately in the presence of an eavesdropper Eve A provably secure (classical) scheme exists for this, called the one-time pad The one-time pad requires Alice & Bob to share a secret key: k  {0,1} n, uniformly distributed (secret from Eve) AliceBob k 1 k 2  k n Eve

23 Schmidt decomposition Let  be any bipartite quantum state:  = Eigenvectors of Tr 1  Then there exist orthonormal states  1 ,  2 , …,  m  and  1 ,  2 , …,  m  such that  = With respect to the above bases, the state “looks” like:  =

24 Quantum key distribution Schmidt decomposition The story bit commitment

25 Private communication Alice sends c = m  k to Bob Bob receives computes c  k, which is ( m  k )  k = m k 1 k 2  k n One-time pad protocol: This is secure because, what Eve sees is c, and c is uniformly distributed, regardless of what m is m1m2mnm1m2mn

26 Key distribution scenario For security, Alice and Bob must never reuse the key bits –E.g., if Alice encrypts both m and m ' using the same key k then Eve can deduce m  m ' = c  c ' Problem: how do they distribute the secret key bits in the first place? –Presumably, there is some trusted preprocessing stage where this is set up (say, where Alice and Bob get together, or where they use a trusted third party) Key distribution problem: set up a large number of secret key bits

27 Key distribution based on computational hardness The RSA protocol can be used for key distribution: –Alice chooses a random key, encrypts it using Bob’s public key, and sends it to Bob –Bob decrypts Alice’s message using his secret (private) key The security of RSA is based on the presumed computational difficulty of factoring integers More abstractly, a key distribution protocol can be based on any trapdoor one-way function Most such schemes are breakable by quantum computers

28 Quantum key distribution (QKD) A protocol that enables Alice and Bob to set up a secure* secret key, provided that they have: –A quantum channel, where Eve can read and modify messages –An authenticated classical channel, where Eve can read messages, but cannot tamper with them (the authenticated classical channel can be simulated by Alice and Bob having a very short classical secret key) There are several protocols for QKD, and the first one proposed is called “BB84” [Bennett & Brassard, 1984]: –BB84 is “easy to implement” physically, but “difficult” to prove secure –[Mayers, 1996]: first true security proof (quite complicated) –[Shor & Preskill, 2000]: “simple” proof of security  Information-theoretic security

29 BB84 Note: –If b' i = b i then a' i = a i –If b' i ≠ b i then Pr[ a' i = a i ] = ½ Bob informs Alice when he has performed his measurements (using the public channel) Next, Alice reveals b and Bob reveals b' over the public channel They discard the cases where b' i ≠ b i and they will use the remaining bits of a and a' to produce the key Note: –If Eve did not disturb the qubits then the key can be just a ( = a' ) –The interesting case is where Eve may tamper with  while it is sent from Alice to Bob  00   10   01   11 

30 BB84 Intuition: –Eve cannot acquire information about  without disturbing it, which will cause some of the bits of a and a' to disagree –It can be proven* that: the more information Eve acquires about a, the more bit positions of a and a' will be different From Alice and Bob’s remaining bits, a and a' (where the positions where b' i ≠ b i have already been discarded): –They take a random subset and reveal them in order to estimate the fraction of bits where a and a' disagree –If this fraction is not too high then they proceed to distill a key from the bits of a and a' that are left over (around n /4 bits)  00   10   01   11   To prove this rigorously is nontrivial

31 BB84 If the error rate between a and a' is below some threshold (around 11%) then Alice and Bob can produce a good key using techniques from classical cryptography: –Information reconciliation (“distributed error correction”): to produce shorter a and a' such that (i) a = a', and (ii) Eve doesn’t acquire much information about a and a' in the process –Privacy amplification: to produce shorter a and a' such that Eve’s information about a and a' is very small There are already commercially available implementations of BB84, though assessing their true security is a subtle matter (since their physical mechanisms are not ideal)