CV%20Cryptography%20Using%20a%20Bidirectional%20Quantum%20Channel - PowerPoint PPT Presentation

About This Presentation
Title:

CV%20Cryptography%20Using%20a%20Bidirectional%20Quantum%20Channel

Description:

Quantum Channel University of ... Remind dense coding protocol! virtual entanglement Two-way quantum channel for QubitKD was put forward by K. Bostrom & T ... – PowerPoint PPT presentation

Number of Views:121
Avg rating:3.0/5.0
Slides: 18
Provided by: Bow125
Learn more at: http://iicqi.sharif.edu
Category:

less

Transcript and Presenter's Notes

Title: CV%20Cryptography%20Using%20a%20Bidirectional%20Quantum%20Channel


1
CV Cryptography Using a Bidirectional Quantum
Channel
University of Camerino, Italy
  • Stefano Mancini

in collaboration with S. Pirandola, S. Lloyd S.
Braunstein (quant-ph/0611167)
2
Outline
  • A general framework for QKD protocols with CV
  • The security analysis
  • From PM protocols to PTM protocols
  • The use of a bidirectional quantum channel
  • The security analysis and the superadditivity of
    security thresholds
  • Conclusions

3
A general framework for CV QKD
  • modulated with variance V-1 (with Vgtgt1)
    givesBobs measurements give

4
  • Xs are correlated random variables characterized
    by I(XAXB). To access this information, either
    Bob estimates Alices encoding (direct
    reconciliation, DR), or Alice estimates Bobs
    outcomes (reverse reconciliation, RR).
  • To get shared secret information the honest
    parties have to estimate the noise in the
    channel (by broadcasting and comparing part of
    their data) so to bound the information I(XAE)
    or I(XBE) which has been potentially stolen by
    Eve

A secret key can be established iff
(Csiszar Korner, 1978)
5
How to bound Eves information?
  • Collective Gaussian attacks are the most powerful
    for the Gaussian state protocols M. Navascues et
    al., PRL 2006 R. Garcia-Patron N. Cerf, PRL
    2006
  • Quadratures encode independent variables
    individual Gaussian interactions do not need to
    mix quadratures to be optimal
    individual Gaussian interaction can be modeled by
    entangling cloner F. Grosshans et al., Nature
    2003

6
(No Transcript)
7
Security thresholds (R 0)
Results in accordance with F. Grosshans, PRL 2005
and M. Navascues A. Acin, PRL 2005.
8
Prepare Measure schemes vs Entanglement based
schemes
virtual entanglement
Resources (energy or entanglement) are in the
hands of Alice What is about distributing them
among Alice and Bob? Remind dense coding
protocol!
9
A shift paradigm from PM to PTM, use a two-way
quantum channel
b
ba
Two-way quantum channel for QubitKD was put
forward by K. Bostrom T. Felbinger, PRL 2002
and M. Lucamarini S. Mancini, PRL 2005.
10
What are the advantages ?
Eve is forced to a double perturbation of the
quantum channel (double exploitment of
uncertainty principle)
11
Security thresholds (collective attacks)
Quantities refer to a single use of the quantum
channel
12
Summary of the results
Superadditivity behaviour of the security
theresholds (the exception being Hom2 DR for TgtTc
0.86 in DR) When the channel is too noisy for
one-way QKD, it can still be used to provide
secure QKD!
13
What is about a quantum Bob?
14
Are there other dangerous attacks ?
  • Coherent attacks exploiting quantum interference
    between forward and backward path of the quantum
    channel
  • Quantum impersonation where Eve short-circuits
    the two paths of the quantum channel

15
How to prevent them ?
Alice and Bob have to check the coherence of the
attacks, i.e. the memory of the quantum channel
16
Towards unconditional scheme exploiting
superadditivity of multiway quantum channel
17
Conclusions
  • Virtual entanglement can be profitably used as a
    cryptographic primitive to assist QKD, when
    two-way quantum communication is used
  • Improvement of QKD security performances
    (superadditivity of security thresholds)
  • A class of attacks has been related to quantum
    memory channels predicting a link between
    correlated noise effects and privacy
  • The given formulation paves the way for the study
    of secure multi-way quantum communication
  • Apply two-(or multi)way quantum communication to
    other cryptographic tasks, secret sharing, data
    hiding etc.
Write a Comment
User Comments (0)
About PowerShow.com