Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secret keys and random numbers from quantum non locality Serge Massar.

Similar presentations


Presentation on theme: "Secret keys and random numbers from quantum non locality Serge Massar."— Presentation transcript:

1 Secret keys and random numbers from quantum non locality Serge Massar

2 Message of this talk: Quantum Information uses the weirdness of quantum mechanics to realise tasks impossible classicaly

3 Message of this talk: Quantum Information uses the weirdness of quantum mechanics to realise tasks impossible classicaly Device Independent approach uses the weirdness of quantum non locality to realise tasks impossible within the usual paradigm of quantum information. Device Independent: QKD Certified Random Number Generation Device Independent quantum state estimation Self Testing of Quantum Computers

4 Entanglement & Non Locality Device Independent: –Quantum Key Distribution –Random Number Generator –State Estimation –Self Testing of Quantum Computers Conclusion Summary of Talk

5 Entanglement and Aspect’s Experiment « Quantum Non Locality » D D Alice Bob D D

6 Entanglement and Aspect’s Experiment « Quantum Non Locality » D D Alice Bob D D X Input =Measurement SettingsY a Output=Measurement Outcomes b

7 D D Alice Bob D D X Input =Measurement SettingsY a Output=Measurement Outcomes b P(a b | X Y)= P( A’s outcome & B’s outcome | A’s measurement setting & B’s measurement setting )

8 P(a b | X Y) X=Alice’s setting a=Alice’s outcome Y=Bob’s setting b=Bob’s outcome Properties of Probabilities: No Signalling Conditions

9 Illustration: CHSH inequality 2 2√2 4 -2 -2√2 -4 LHV Quantum No Signaling D D Alice Bob D D

10 Geometric Picture 2 2√2 4 -2 -2√2 -4 LHV Quantum No Signaling quantum LHV Quantum No Signaling

11 4 Interpretations-4Models Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements No Signaling Information cannot travel faster than the speed of light Contradicts Experiments (Except for detection loophole)

12 4 Interpretations-4Models Quantum Mechanics Non Deterministic Outcomes of measurements not defined in advance No Signaling Information cannot travel faster than the speed of light Agrees with Observations «Quantum Non Locality»

13 4 Interpretations-4Models Non Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements Non Local The hidden variables are global. Information travels faster than c Contradicts Relativity Exponentially Inefficient

14 4 Interpretations-4Models Conspiracy Theories Everything is Predetermined No Freedom to Choose Measurement Settings No Free Will Contradicts the Locality of Physical Interactions Exponentially Inefficient ?

15 Implications for Crypto Quantum Mechanics Non Deterministic Outcomes of measurements not defined in advance No Signaling Information cannot travel faster than the speed of light Agrees with Observations «Quantum Non Locality» Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements No Signaling Information cannot travel faster than the speed of light Contradicts Experiments (Except for detection loophole) Non Local Hidden Variables Compatible with Determinism Hidden variables determine in advance the results of measurements Non Local The hidden variables are global. Information travels faster than c Contradicts Relativity Exponentially Inefficient ? Conspiracy Theories Everything is Predetermined No Freedom to Choose Measurement Settings No Free Will Contradicts the Locality of Physical Interactions Exponentially Inefficient ?

16 Observation of Non Locality & assume Validity of Quantum Mechanics Secure Labs (no signalling) Freedom to choose measurement settings Implies: →Measurement outcomes are random →Monogamy of correlations Some initial randomness is necessary. Locality Loophole does not need to be closed: Only require no signalling between Alice and Bob Can be replaced by weaker assumption: all correlations are no signalling. Application: Random Number Generator Application: Key Distribution Security depends only on correlations between inputs and outputs P(ab|XY) Device Independent

17 And the Experimental Situation ? !!!!!!!!!!!!!! Rate = mHz !!!!!!!!!!!!!!!

18 Quantum Key Distribution What about Security?

19

20

21 Practical QKD Beware of the hidden side channel Beware of inefficient detectors Solution: Device Independent Approach

22 Device Independent QKD Ekert 1991 Mayers and Yao 2004 Barrett Hardy and Kent 2005 Acín Brunner Gisin Massar Pironio and Scarani 2007 M. McKague, arXiv:0908.0503 Key Idea: Monogamy of Non Local Correlations

23 Device Independent QKD Key Idea: Monogamy of Non Local Correlations Security depends only on the correlations between inputs and outputs No hypothesis needed –on Hilbert space dimension –on workings of devices they could even be provided by an adversary

24 Device Independent QKD To make the concept practical: Theory needed: security proof when the same devices are used in succession Experiment needed: Non Locality Experiments with: –detection loophole closed –High data rate –Long Distance Communication Not necessary to close locality loophole !! –Security of Laboratories is Necessary for crypto –Security of Laboratories Sufficient to enforce No Signalling Could even be secure against Post-Quantum Adversary –Only require that No Signalling Conditions be Enforced.

25 Random Number Generators

26 Are RNG’s secure? -Are the bits random? (statistical tests only say that they look random) -Are they secret? (maybe the device has failed, is preprogramed)

27 Device Independent Random Number Generator Key Ideas: –Monogamy of Non Local Correlations P(abe|XYE)≈P(ab|XY)P(e|E) → adversary has no knowledge of a,b –Violation of a Bell inequality implies that outcomes a,b are random → new random numbers are generated Kollbeck, PhD thesis Pironio Acin Massar Boyer de la Giroday Matsukevich Maunz Olmschenk Hayes Luo Manning Monroe, submitted

28 Device Independent Random Number Generator Key Idea: –Monogamy of Non Local Correlations P(abe|XYE)≈P(ab|XY)P(e|E) → adversary has no knowledge of a,b –Violation of a Bell inequality implies that outcomes a,b are random → new random numbers are generated Even Secure Against Post Quantum adversary limited only by No-Signalling

29 Device Independent Random Number Generator Key Idea: –Monogamy of Non Local Correlations P(abe|XYE)≈P(ab|XY)P(e|E) → adversary has no knowledge of a,b –Violation of a Bell inequality implies that outcomes a,b are random → new random numbers are generated Randomness Expansion: –Most of the time choose X=Y=0 –From time to time test other settings → Use O(n Log n) random bits to produce O(n 2 ) new random bits

30 Experimental Demonstration Theory: takes into account possible memory of devices Use two ions in two traps separated by about 1m !!Not Necessary to close Locality Loophole!! Detection loophole closed

31 Experimental Demonstration Number of events n=3016 Data acquisition time: 1 month =2.414 42 new private random bits produced at 99% confidence level Theory: takes into account possible memory of devices Use two ions in two traps separated by about 1m !!Not Necessary to close Locality Loophole!! Detection loophole closed

32 Experimental Demonstration Number of events n=3016 Data acquisition time: 1 month =2.414 42 new private random bits produced at 99% confidence level Theory: takes into account possible memory of devices Use two ions in two traps separated by about 1m !!Not Necessary to close Locality Loophole!! Detection loophole closed For the first time, the randomness of a source can be certified by something more fundamental than statistical tests.

33 Device Independent State Estimation Observe: Task: Find Fidelity to Φ + state Find Entanglement of Formation of source as function of only ? X a ? Y b Bardyn Liew Massar McKague Scarani arXive:0907.3584

34 Device Independent State Estimation Observe: Task: Find Fidelity to Φ + state Find Entanglement of Formation of source as function of only ? X a ? Y b

35 Dimension Witnesses ? X a ? Y b Brunner Pironio Acin Gisin Méthot Scarani 2008 Vertesi Pal arXiv:0812.1572 Briet Buhrman Toner arXiv:0901.2009 Observe: Violation of Bell inequality Task: Find Lower Bound on Dimension of Entangled State as function of violation of Bell inequality only

36 Self Testing of Quantum Computers Mayers Yao 2004 Magniez Mayers Mosca Ollivier 2006 First Quantum Computer Second Quantum Computer Repeatedly measure output Results of measurements Certify that computer output is correct ? ? Repeated Use of Unknown Quantum Computer, using Unknown Entanglement, with intermediate measurements can Certify that output of computation is correct.

37 Message of this talk: Use the weirdness of quantum non locality to realise tasks impossible within the usual paradigm of quantum information: Device Independent Quantum Key Distribution Certified Random Number Generation Quantum State Estimation Self Testing of Quantum Computers Overview: A. Ekert, Less Reality, More Security, Physics World, Sept 2009, pp. 28-32


Download ppt "Secret keys and random numbers from quantum non locality Serge Massar."

Similar presentations


Ads by Google