Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Quantum Computation and Quantum Information – Lecture 2
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Quantum Computing MAS 725 Hartmut Klauck NTU
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
Study Group Randomized Algorithms 21 st June 03. Topics Covered Game Tree Evaluation –its expected run time is better than the worst- case complexity.
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
1 quantum teleportation David Riethmiller 28 May 2007.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Part 3: The Minimax Theorem
Short course on quantum computing Andris Ambainis University of Latvia.
Separable States can be Used to Distribute Entanglement Toby Cubitt 1, Frank Verstraete 1, Wolfgang Dür 2, and Ignacio Cirac 1 1 Max Planck Institüt für.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Oblivious Transfer based on the McEliece Assumptions
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Chui-Ping Yang, Shih-I Chu, Siyuan Han Physical Review.
Oded Regev (Tel Aviv University) Ben Toner (CWI, Amsterdam) Simulating Quantum Correlations with Finite Communication.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Introduction to Quantum Information Processing Lecture 4 Michele Mosca.
CSEP 590tv: Quantum Computing
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
From finite projective geometry to quantum phase enciphering (Discrete Math of MUBs) H. Rosu, M. Planat, M. Saniga (IPICyT-Mx, LPMO-Fr, Astronomical Inst.-Sk)
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
All of Statistics Chapter 5: Convergence of Random Variables Nick Schafer.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Quantum Dense coding and Quantum Teleportation
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Diagonalization and Similar Matrices In Section 4.2 we showed how to compute eigenpairs (,p) of a matrix A by determining the roots of the characteristic.
Efficiency of Multi-Qubit W states in Information Processing Atul Kumar IPQI-2014 IIT Jodhpur
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 15: From Here to Oblivion.
The Law of Averages. What does the law of average say? We know that, from the definition of probability, in the long run the frequency of some event will.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Two.
Quantum Teleportation
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Presentation transcript:

Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009

What are teleportation and bit commitment? (1) Teleportation: Arguably the most novel of all quantum protocols (procedures). It allows one to recreate an unknown quantum state at a remote site without physically transferring the quantum state itself.

(2) Bit commitment is a primitive (basic) two-party quantum protocol which can be use as the building block of other more complicated two-party protocols. Two parties Alice and Bob…

What do these two protocols have in common? Before answering this question, I will have to tell you something about density matrix

It is well know that for a pure state the density matrix is simply given by For a mixed state denoted by then

Given a density matrix, there are always Infinitely many different representations, e.g., and etc.

Purification: A mixed state in a Hilbert space can always be written as a pure state in a higher dimension Hilbert space Such that e.g., for the mixed state

If party-A applies an unitary transformation on her states orthrononmal set namely, It is easy to show that the reduced density matrix on B’s side remain unchanged. *** It must be so, otherwise one could transfer information instantaneously!

Theorem: All representations of can be generated in this manner. Hughston, Jozsa, and Wooters (Phys. Lett. A 183 (1993) 14.) This property of mixed quantum states has been found to be useful in discussions related to teleportation, bit commitment.

Note that, although it is impossible for party-A (Alice) to remotely change the density matrix of party-B (Bob), it is nevertheless possible for her to change the representation of instantaneously at will! All she has to do is apply an appropriate transformation on the basis in her hand.

(1)Teleportation Suppose Alice has an unknown quantum state, and in addition she shares a Bell (entangled) state with Bob: Then she can use this quantum channel to recreate at Bob’s site without sending the particle itself.

It goes as follows: where and

Therefore If Alice makes a “Bell measurement”, and tells Bob what she gets (say i=3 ), then Bob will be able to recreate in his lab. by making a compensating unitary transformation Note that: (1) The protocol is linear, that is, could be part of a N-particle state, so that one can teleport the whole N-particle state by repeating the above process N times. Provided, of course, Alice shares N pairs of Bell states with Bob,

(2) could be a mixed state. Since as we have seen, any mixed state can be regarded as a pure state if one enlarges the Hilbert space. Question: What if the given quantum channel cannot be written as a product of Bell states? (i) How do we know if it could be used for teleportation? (ii) If so, how does one proceed?

There exists no general result in the literature, and one just have to treat the problem on a case by case basis. For example, Zha and Song (Phys. Lett. A, 2007) considered the teleportation of a 2-particle state when the given channel is an arbitrary state (Alice: 1234; Bob: 56)

They found that the combined state can always be recast in the form From which they conclude that if is unitary then Alice can teleport faithfully the 2-particle state. Otherwise, no.

Also, Yeo and Chua ( Phys. Rev. Lett. 96 (2006) ) found a class of so-called 4-particle genuinely entangled states which cannot be recast into a product of Bell states, but they can be used to teleport faithfully arbitrary 2-particle state. And there are others … 1.P.X. Chen et al, PRA 74 (2006) J. Lee et al, PRA 66 (2002) G. Rigolin, PRA 71 (2005) P. Agrawal, PRA 74 (2006) S. Muralidharan et al, PRA 77 (2008) …

However, all of the results are not general, in the sense that they work for some specifically constructed quantum channels only.

.

Note: (1) d is the number of unpolarized qubits in H_B (2) Local operations on H_B does not change the degree of entanglement between Alice and Bob.

Conclusion: We have found a criterion which allows one to judge if any given quantum channel is good for faithful teleportation, and if so, how many qubits can it teleport.

(2). Quantum bit commitment QBC is a quantum cryptographic protocol involving two parties: Alice and Bob They do not trust each other and they will do whatever it takes to gain an advantage!

The security of QBC is an important issue because it can be used as the building block of various other two- party quantum protocols, such as quantum coin tossing, etc. QBC: Commitment + Unveiling

Commitment phase: Alice secretly commits to a bit b = 0 or 1, which is to be revealed to Bob at a later time. To ensure that Alice will not change her mind before unveiling, Alice and Bob execute a series of quantum and classical exchanges such that in the end, Bob has a quantum state in his hand.

Unveiling phase: 1. Alice reveals the value of b. 2. With some additional information from Alice, Bob uses to check whether Alice is honest.

Security issues: A QBC protocol is secure if it is 1.Binding: Alice cannot change her commitment without Bob’s knowledge. 2.Concealing: Bob cannot find out the value of b before Alice unveils it.

Concealing condition implies: Ideal case Non-ideal case

Unconditional Security: If the protocol remains secure even when A and B had capabilities limited only by the laws of nature. (Security unaffected by any possible technological advances.)

Example (1): 1.Alice writes b on a piece of paper and locks it in a box. 2.She gives the box (but not the key) to Bob as evidence of her commitment. Concealing: Bob cannot read the paper Binding: Paper is in Bob’s hand

(1) The box is hard to break (2) Bob cannot pick the lock (3) Etc…. How about QBC? However classical BC cannot be unconditionally secure, because it’s security is always dependent on some unproven assumptions:

Example (2): To commit, Alice sends Bob a sequence of qubits Where

Binding: If Alice commits to b=0 initially, she cannot open as b=1, for if she did, her chance of success on each qubit is ½, therefore the overall chance of cheating successfully is exponentially small. Concealing:

So naively, it seems that such a protocol is unconditionally secure!

No-Go Theorem Lo and Chau (1997), Mayers (1997) If a protocol is concealing, it cannot be binding at the same time. Unconditionally secure QBC is impossible as a matter of principle.

Main Idea of the Proof: Purification – Alice leaves all undisclosed classical information undetermined at the quantum level by entangling with ancillas. Any action taken on a quantum system can be represented by an unitary transformation on system + environment (ancillas) Needs quantum computers.

At the end of commitment phase: Instead of a mixed state in There exists a pure state in H A is used to store Alice’s undisclosed info. As long as Bob cannot tell whether Alice purifies or not! Purification

Then Alice has a perfect cheating strategy (EPR attack): Because Hence,

Notice: U A acts on H A only Alice can execute it without Bob’s knowledge Therefore Alice can unveil b=0 or b=1 at will. Cheating! (That is, the protocol is not binding!)

How does it work in example (2)? Instead of honestly producing She generates

That is, instead of fixing undisclosed information at the beginning, Alice leaves it undetermined at the quantum level. That is, recorded in ancillary qubit states. Then she can cheat perfectly:

So it seems that unconditionally secure QBC is impossible!

Question: Does the “no-go theorem” cover all possible cases? Note that QBC has a definite objective, but the corresponding procedure is not precisely defined. There are infinitely many ways to do QBC. So how could one be sure the no-go result is universally valid?

In the impossibility proof, in order that Alice knows U A, it is assumed that Alice knows every details of the protocol, so that no secret parameters exist. * Secret Parameters What if Bob is allowed to generate secret parameters unknown to Alice?

The point is: If the pure state depends on some parameter unknown to Alice? Then

1.In general, depends on 2.But is not known to Alice, therefore she cannot calculate 3.If so, then unconditionally secure QBC might be possible (?) The point is, the no-go theorem only proves the existence of, but there is no guarantee that it is known to Alice!

However, we find that for a concealing QBC protocol, the cheating unitary transformation is independent of any secret parameter (probability distribution),, chosen by Bob. (Purification is assumed to hold. In a purified approach, probability distributions are the only possible unknowns left.)

Proof: If Bob is allowed to choose from in secret, then he can purify his choices with an associated probability distribution That is, instead of picking a particular,

Where are orthonormal ancilla states. Now the protocol is concealing. Therefore no matter what Bob uses, the resulting reduced density matrix must be independent of b Bob entangles all his possible choices

Then there exists an such that Since `s are orthogonal states in Whereas acts on H A only. Then it is easy to show that

Hence Is independent of ! Hence we have proved that Alice can cheat perfectly whether Bob uses secret parameters or not.

*Conclusion For a concealing QBC protocol, i.e., is independent of any of Bob’s secret choices, and Alice can calculate it without knowing them.

Therefore, even if Bob is allowed to generate secret parameters unknown to Alice, she can still cheat perfectly. Our result enlarges the applicability of the no-go theorem to include cases where the parties are allowed to use parameters not known to each other.

Thank you!

Lo and Chau: “In order that Alice and Bob can follow the procedures, they must know the exact forms of all unitary transformations involved“ Mayers: “It is a principle that we must assume that every participant knows every detail of the protocol, including the distribution of probability of a random variable generated by another participant"