1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.

Slides:



Advertisements
Similar presentations
Quantum Computing MAS 725 Hartmut Klauck NTU
Advertisements

CQCT Feb 07 Griffith University 1 Joan Vaccaro Joe Spring Anthony Chefles Quantum Polling HP Labs, Bristol Griffith University Uni of Hertfordshire QUantum.
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Short course on quantum computing Andris Ambainis University of Latvia.
1 Multiphoton Entanglement Eli Megidish Quantum Optics Seminar,2010.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Classical capacities of bidirectional channels Charles Bennett, IBM Aram Harrow, MIT/IBM, Debbie Leung, MSRI/IBM John Smolin,
QEC’07-1 ASF 6/13/2015 MIT Lincoln Laboratory Channel-Adapted Quantum Error Correction Andrew Fletcher QEC ‘07 21 December 2007.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
Toyohiro Tsurumaru (Mitsubishi Electric Corporation) Masahito Hayashi (Graduate School of Information Sciences, Tohoku University / CQT National University.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
General Entanglement-Assisted Quantum Error-Correcting Codes Todd A. Brun, Igor Devetak and Min-Hsiu Hsieh Communication Sciences Institute QEC07.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Communication, Quantum Entanglement and All That Jazz Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering,
Autonomous Quantum Error Correction Joachim Cohen QUANTIC.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Test for entanglement: realignment criterion, entanglement witness and positive maps Kai Chen † CQIQC, Toronto, July 2004 † Kai Chen is now a postdoctoral.
Jian-Wei Pan Decoherence-free sub-space and quantum error-rejection Jian-Wei Pan Lecture Note 7.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Quantum Convolutional Coding for Distillation and Error Correction Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical.
The private capacities of a secret shared reference frame Patrick Hayden (McGill) with: PRA 75: (2005) ??? Stephen Bartlett Robert Spekkens arXiv:quant-ph/
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 20 (2009)
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
The Classically Enhanced Father Protocol
Efficiency of Multi-Qubit W states in Information Processing Atul Kumar IPQI-2014 IIT Jodhpur
Quantum Entanglement and Distillation in Information Processing Shao-Ming Fei
Quantum Coding with Entanglement Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of Southern.
Quantum Convolutional Coding Techniques Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of.
Marcos Curty 1,2 Coauthors: Tobias Moroder 2,3, and Norbert Lütkenhaus 2,3 1.Center for Quantum Information and Quantum Control (CQIQC), University of.
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
1 Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University.
Cryptography In the Bounded Quantum-Storage Model
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Optics II – Cozumel December 2004 Quantum key distribution with polarized coherent states Quantum Optics Group Instituto de Física “Gleb Wataghin”
Quantum Cryptography Antonio Acín
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum entanglement measures and detection
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Presentation transcript:

1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept. of Elect. & Computer Engineering (ECE), & Dept. of Physics University of Toronto Reference: quant-ph/ July 20, 2004

2 Outline Background and motivation Tasks: Conference key-agreement and secret sharing in a noisy channel What’s the approach? Results and significance Summary and future scope

Background and motivation (I) Practical New application of quantum cryptography in multipartite setting Bridge the gap Develop a class of protocols with feasible experimental technology Conference key-agreement Quantum sharing of classical secrets Theoretical Entanglement distillation (for bipartite case much is known) Distill multipartite entanglement directly (proved to be more efficient than two-party distillation separately) Better understand and quantify multipartite entanglement

4 Motivation (II): Why use multipartite entanglement? Alternative solution Relatively less sources Nice physical insight Advantage: more efficient, more robust For conference key-agreement protocols: For secrets sharing, comparing with QKD+classical secret sharing scheme Finish information splitting and eavesdropper protection simultaneously

Task 1: Conference key-agreement scheme in a noisy channel Eve Solution: Using GHZ state (Greenberger-Horne-Zeilinger states): noise j GHZ i = 1 p 2 ( j 0 ij 0 ij 0 i + j 1 ij 1 ij 1 i ) Task: Alice, Bob and Charlie generate the same secure key string k. Alice Bob Charlie

Task 2: Quantum Sharing of classical Secrets in a noisy channel Alice Bob Charlie Classical communication Basis info. j GHZ i = 1 p 2 ( j 0 ij 0 ij 0 i + j 1 ij 1 ij 1 i ) Task: Alice wants to share a secret with Bob and Charlie, in such a way that either Bob or Charlie alone can not obtain the secret, but when Bob and Charlie get together, they can obtain the secret. Using perfect GHZ state when all participants measure along X basis M. Hillery et al, PRA 59 (1999) 1829 X A +X B +X C =0 mod 2 Eve

7 Our approach Push Shor-Preskill and Gottesman-Lo’s ideas to multipartite case. Reduce security of cryptographic protocols to a class of distillation problems of the GHZ states Prepare and measure type protocols impose some restrictions on possible local operations of participants for the GHZ state distillation. PHASE ERROR DETECTION STRICTLY FORBIDDEN! (Phase error syndrome NOT available without quantum computers.)

8 Correspondence between CSS codes and BB84 (Shor-Preskill’s proof) CSS codes bit flip error correction phase error correction BB84 error correction privacy amplification (to remove Eve’s info.) N.B.: CSS stands for Calderbank-Shor-Steane codes. PRL 85 (2000) 441

9 Correspondence between EDP and BB84 (Gottesman-Lo’s proof) CSS codes bit-flip error detection bit flip error correction phase error correction BB84/six-state “advantage distillation” error correction privacy amplification EDP: Entanglement Distillation Protocol IEEE Trans. Inf. Theor. 49 (2003) way classical communications

Notations stabilizer formulation of GHZ state S 0 = X ­ X ­ X ; S 1 = Z ­ Z ­ I ; S 2 = Z ­ I ­ Z : j GHZ i = 1 p 2 ( j 0 ij 0 ij 0 i + j 1 ij 1 ij 1 i ) GHZ basis correspond to the eigenvalues of the 3 stabilizer generators by correspondence relation: S 0 ; S 1 ; S 2 e i genva l ue 1 ¡ ! l a b e l 0 ; e i genva l ue ¡ 1 ¡ ! l a b e l 1 : Thus one can label a GHZ-basis diagonal state as ½ ABC = f p 000 ; p 001 ; p 010 ; p 011 ; p 100 ; p 101 ; p 110 ; p 111 g j ª b 0 ; b 1 ; b 2 i ABC = 1 p 2 ( j 0 ij b 1 ij b 2 i + ( ¡ 1 ) b 0 j 1 i ¯ ¯ b 1 ® ¯ ¯ b 2 ® ( b 0 ; b 1 ; b 2 )

Conference key-agreement scheme in a noisy channel B step: bit-flip error detection (keeps the first trio iff M A2 =M B2 =M C2 ) P step: phase-flip error correction (3 qubits majority code) (apply correction to the first trio (say a Z operation on Alice) iff M A2 +M B2 +M C2 = M A3 +M B3 +M C3 =1 mod 2) + Multi-partite one-way hashing protocol (from Maneva and Smolin, quant-ph/ ) Yield: Our Improved yield:

Quantum Sharing of classical Secrets in a noisy channel B’ step: bit-flip error detection P’ step: phase-flip error correction (3 qubits majority code) + Multi-partite one-way hashing protocol ( keeps the first trio iff M A2 +M B2 +M C2 =0 mod 2 ) (apply correction to the first trio iff M A2 +M B2 =M A3 +M B3 =1: an X operation on Bob M A2 +M C2 =M A3 +M C3 =1: an X operation on Charlie

13 Reduction to prepare and measure type protocols Depolarization to the GHZ-basis diagonal states (applying stabilizer generators with probability 1/2) Error rate estimation and derivation of density matrix (GHZ-basis diagonal) by measuring stabilizer group elements Adaptively apply B and P steps plus random hashing method, which can be done by local individual quantum measurements and local classical computations and classical communications (CCCCs) Remark: 1.All the participants do not need to perform phase error correction. (The point is that, it would have been successful, if they had performed it). 2.They simply to take the parity Z 1 +Z 2 +Z 3 mod 2 for conference key-agreement and the parity X 1 +X 2 +X 3 mod 2 for secret sharing in the phase error correction procedure. No classical communication is needed.

Our results Secure conference key-agreement is attainable whenever F> while for secret sharing whenever F> For Werner-like states: where the fidelity F is defined as ½ W = ® j GHZ ih GHZ j + 1 ¡ ® 2 N I ; 0 · ® · 1 ; F = h GHZ j ½ W j GHZ i = ® + 1 ¡ ® 2 N Significance Better than protocols with only one-way classical communications which will fail whenever F≤9/16= Better than the requirement of violation of the standard Bell inequality F>9/16 Reduction to protocols with only bi-partite entanglement: feasible with current technology In a prepare-and-measure protocol, Alice has the option to pre-measure her subsystem (the same as the Shor-Preskill and Gottesman-Lo’s arguments).

Summary and further scope Start with protocols for GHZ distillation and reduce it to prepare-and- measure type protocols for quantum cryptography. Our protocols can be implemented with only bi-partite entangled states which are feasible with current technology. This is only a first step of theoretical demonstration for multipartite entanglement to quantum cryptography. More work should be done: 1. Exploring more parties and more complicated structure of quantum cryptographic tasks. e.g. secret sharing for a general access structure. 2. Develop better protocols which works for more noisier states and higher yield. 3. Experimental realization (we are actively discussing with experimentalists on implementation). Reference: quant-ph/

16