Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:0807.2158.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

How Much Information Is In A Quantum State? Scott Aaronson MIT |
Robust device independent randomness amplification with few devices F.G.S.L Brandao 1, R. Ramanathan 2 A. Grudka 3, K. 4, M. 5,P. 6 Horodeccy 1 Department.
QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
Randomness Extraction and Privacy Amplification with quantum eavesdroppers Thomas Vidick UC Berkeley Based on joint work with Christopher Portmann, Anindya.
Quantum Computing MAS 725 Hartmut Klauck NTU
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
On Fair Exchange, Fair Coins and Fair Sampling Shashank Agrawal, Manoj Prabhakaran University of Illinois at Urbana-Champaign.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
The Unique Games Conjecture with Entangled Provers is False Julia Kempe Tel Aviv University Oded Regev Tel Aviv University Ben Toner CWI, Amsterdam.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Short course on quantum computing Andris Ambainis University of Latvia.
Bell inequality & entanglement
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Toyohiro Tsurumaru (Mitsubishi Electric Corporation) Masahito Hayashi (Graduate School of Information Sciences, Tohoku University / CQT National University.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Adaptively Secure Broadcast, Revisited
Spanish Cryptography Days, November 2011, Murcia, Spain Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Device-Independent.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
Physical Randomness Extractor Xiaodi Wu (MIT) device ……. Ext(x,s i ) Ext(x,0) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x uniform-to-all uniform-to-device.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Cryptography In the Bounded Quantum-Storage Model
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
The question Can we generate provable random numbers? …. ?
Indefinite causal order in quantum mechanics Faculty of Physics, University of Vienna & Institute for Quantum Optics and Quantum Information, Vienna Mateus.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Antonio Acín
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Week 21 Statistical Model A statistical model for some data is a set of distributions, one of which corresponds to the true unknown distribution that produced.
Secret keys and random numbers from quantum non locality Serge Massar.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
M. Stobińska1, F. Töppel2, P. Sekatski3,
Efficient Device-Independent Quantum Key Distribution
with Weak Measurements
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Key Distribution
CAE: A Collusion Attack against Privacy-preserving Data Aggregation Schemes Wei Yang University of Science and Technology of China (USTC) Contact Me.
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
Presentation transcript:

Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:

Outline 1.Why violation of Bell inequalities plus no-signaling imply secure key distribution? 2.Description of the key distribution protocol 3.The security definition 4.Main result (security of privacy amplification) 5.Analogy between Bell-violation and the min entropy 6.The device-independent-security model 7.Imposing quantum mechanics 8.Estimation without de-Finetti 9.Sketch of the proof 10.Conclusions

No-signaling plus Bell-violation implies privacy Forget quantum mechanics Consider 2 parties (Alice and Bob)

No-signaling plus Bell-violation implies privacy Suppose a third party (Eve) knows the outcome of Alice’s are compatible The correlations do not violate any Bell inequality

No-signaling plus Bell-violation implies privacy CONCLUSION: If a Bell inequality is violated the outcomes cannot be perfectly known by a third party Relation between the amount of Bell inequality violation and the degree of privacy

A key distribution protocol 1.Distribute N pairs of systems

A key distribution protocol 1.Distribute N pairs of systems 2.Measure all systems with the observable x=y=0 3.Error correction

A key distribution protocol 1.Distribute N pairs of systems 2.Measure all systems with the observable x=y=0 3.Error correction 4.Privacy amplification (with a constant function)

A key distribution protocol 1.Distribute N pairs of systems 2.Measure all systems with the observable x=y=0 3.Error correction 4.Privacy amplification (with a constant function)

A key distribution protocol If the numbersare well chosen the 2 keys are identical and secure To decide we need an estimation step (latter)

The no-signaling assumption Alice, Bob and Eve share a distribution None of the systemscan signal the rest

The security definition Consider Alice’s key when M=0 Ideal secret key: Real secret key (result of the protocol): Security definition: the real and the ideal distributions are indistinguishable, even if Alice and Eve cooperate for this purpose

The security definition Consider Alice’s key when M=0 Ideal secret key: Real secret key (result of the protocol): Security definition: the real and the ideal distributions are indistinguishable, even if Alice and Eve cooperate for this purpose Any use of the the real key will give the same results as the ideal key (Universally-composable security)

Main result: security of privacy amplification For any nonsignaling distribution let with all x=0, then where PR-boxQuantumClassical CHSH

Main result: security of privacy amplification For any nonsignaling distribution let with all x=0, then where

Main result: security of privacy amplification For any nonsignaling distribution let then where QuantumClassicalPR-boxQuantumClassical CHSH BC

Bell violation is analogous to the min entropy Define Min entropy is the central quantity in standard QKD allows for deterministic randomness extraction, while needs random hashing

Incorporating public communication If Alice publishes M bits during the protocol Efficiency

Secret key rates No-sign G obs 6 states

The device-independent security model Untrusted device: a physical system plus the measurement apparatus For each system, we can ignore the dimension of the Hilbert space, the operators that correspond to the observables 0 and 1, etc.

The device-independent security model Untrusted device: a physical system plus the measurement apparatus Trusted device: classical computer, random number generator, etc

Physical meaning of the no- signaling constrains Systems must not signal Eve Systems must not signal the other party Signaling among Alice’s systems must not occur Signaling among Bob’s systems is allowed

The device-independent security model The simplest implementation of QKD is through a sequential distribution of pairs of systems All systems in one side are observed with the same detector In this set up, the assumption of full no-signaling in Alice’s side seems unjustified

The device-independent security model Total relaxation If we allow signaling between Alice’s systems, privacy amplification is impossible Although it is fair to assume something stronger

The sequential no-signaling model time We call these constraints sequential no-signaling If the function used for hashing is XOR or MAJORITY, there is a sequential no-signaling attack (E. Hanggi, Ll. Masanes) Does this happen with any function?

Let’s assume quantum mechanics Let us impose Or something weaker

Let’s assume quantum mechanics Let us impose Or something weaker We obtain the same expressions with

Secret key rates No-sign G obs No-sign + QM 2 obs 6 states

Estimation of and In the unconditional security scenario, Alice and Bob have no idea about nor There is no known exponential de Finetti-like theorem Instead

A problem with the estimation With this method we do not get the above rates [singlets give: rate = 0.26 < 1!] Can we find an estimation procedure which gives the expected rates? Is this something fundamental?

Sketch of the proof

Conclusions 1.Key distribution from Bell-violating correlations is secure, with the sole assumption of no-signaling 2.According to the strongest notion of security (universally-composable) 3.Analogy between Bell-violation and the min entropy 4.The security of the scheme is device independent 5.Rates can be improved by assuming QM 6.Deterministic randomness extraction is possible 7.Thanks for your attention

Smooth Bell-inequality violation Define Bell-inequality violation is asymptotically discontinuous

Analogy with the smooth min entropy Min entropy is the central quantity in standard QKD allows for deterministic randomness extraction, whileneeds random hash

Incorporating public communication If Alice publishes M bits during the protocol Efficiency

Sketch of the proof

Assuming quantum mechanics Let us impose Or something weaker