MultiPhoton Quantum Cryptography - PowerPoint PPT Presentation

1 / 31
About This Presentation
Title:

MultiPhoton Quantum Cryptography

Description:

Eve's tampering disturbs quantum state. Can't prevent, only detect, Eve. Multi ... Assume all errors due to Eve. Error correction Privacy Amplification ... – PowerPoint PPT presentation

Number of Views:59
Avg rating:3.0/5.0
Slides: 32
Provided by: george302
Category:

less

Transcript and Presenter's Notes

Title: MultiPhoton Quantum Cryptography


1
Multi-Photon Quantum Cryptography
  • George Khoury
  • Dirk Bouwmeester
  • UC Santa Barbara

2
Outline
  • Review of classical cryptography
  • Multi-photon QC proposal
  • Protocol
  • Advantages
  • Challenges

3
The Players
Alice
Bob
Eve
4
Vernam Cipher
  • Alice and Bob share secret key k
  • Unconditionally secure if k is secret
  • Message m 101010101
  • Key k 001001111
  • Ciphertext C m?k 100011010
  • Decrypt m C?k 101010101

5
Vernam Cipher
  • Inconvenient k m
  • Really inconvenient k used only once
  • C1 m1?k
  • C2 m2?k
  • C1?C2 m1?k?m2?k m1?m2

6
Public Key Cryptography
  • Bob distributes public key, keeps secret key
  • No shared secret necessary
  • Maybe computationally secure

Alice encrypts with public key
Only Bobs secret key decrypts
7
Quantum Cryptography
  • Bits encoded in quantum states
  • Security from quantum mechanics
  • Eves tampering disturbs quantum state
  • Cant prevent, only detect, Eve

8
Multi-photon pulses
  • Security risk in single-photon protocols
  • Hard to avoid

9
Multi-photon QC Protocol
10
Singlet States
Form preserved in any basis (nh)Bob
(nv)Alice (nhnv)Bob (nvnh)Alice
11
nah
nbh
EOM
EOM
nav
nbv
PBS
PBS
Basis
Result
Basis
Result
  • Alice and Bob randomly measure in non-orthogonal
    bases
  • Alice (Bob) records nh(nv), nhnv
  • Correlated results if they use the same basis

L C C C L C L L C L
L C L L L C L C C L
2 1 1 3 3 1 2 1 1 0
2 1 0 1 3 1 2 2 1 0
12
Key sifting
13
Error estimation
  • Alice and Bob announce random subset of sifted
    key
  • Ideally, no errors
  • QBER error rate in sifted key
  • Assume all errors due to Eve

14
Error correction Privacy Amplification
  • Classical error correction eliminates Bobs
    errors
  • Privacy amplification reduces Eves information
    to zero. Possible if

15
What about losses?
  • Linear losses (independent of intensity) modeled
    by beamsplitter in front of detectors

16
Simple Eavesdropping Strategy
  • Assume Eve controls the source
  • Eve replaces with
  • Constrained to mimic expected probabilities

17
Secrecy Capacity
  • For losses lt 35, using two photon pulses
    increases capacity

18
Technical Challenges
  • Bright source of entangled photons
  • Efficient photon counters
  • Low loss transmission links

19
Entangled Photon Source
a
BBO
?/2
UV pump
b
20
Visible Light Photon Counter
  • Developed by Boeing for Fermilab
  • High quantum efficiency photon counter

Courtesy Don Lincoln, Fermilab
21
VLPC Operation
VB
As atoms form impurity band 50 meV below
conduction band Photon absorbed in Si creates
electron-hole pair
Si
As-doped
n
22
VLPC Operation
VB
Hole accelerates, ionizes As e- into CB
Si
As-doped
These electrons accelerate, ionize As As charge
limits avalanche
n
23
Conclusion
  • Single photon pulses are not necessary if you
    have photon counters
  • Multi-photon pulses can increase bit rate
  • Efficiency necessary currently unobtainable over
    long distance

24
No information without disturbance
Eve would like U such that
But U is unitary
25
Entropy, Mutual Information
26
RSA details
  • Choose two large primes p, q
  • Compute n pq, f(n) (p-1)(q-1)
  • Choose e rel. prime to f
  • Compute d, s.t. ed 1 (mod f)
  • Public key (e, n) Secret key (d,n)
  • E(M)Me (mod n)
  • M(E) Ed (mod n)

27
Error Correction
  • Shannon limit
  • e.g. Hamming code
  • Check bits compute parity of different
    subsections of message
  • 1 means error in that subset
  • Intersection of all subsets w/ error is the error
    location

28
Privacy Amplification
  • Replace sets of bits with their XOR
  • If Eve knows only one of the bits, she has no
    idea about the XOR

1 ? ? ? 0 ? ? ?
29
Message Authentication
  • Alice and Bob agree on a set of functions F M ?
    T
  • Also share secret key, which chooses an f from F
  • Alice sends m, t f(m)
  • Bob computes f(m), compares to t

30
Message Authentication
  • Eve knows f is in F f(m1) t1
  • F has M / T members
  • M / T2 also satisfy f(m2) t2
  • Eve can only guess which function in F is being
    used, but only 1 / T will be correct
  • Trick is to find a small set F (so that key is
    small)

31
Electronics
clock
counter
write
RAM
addr
disc.
x4
data
VLPC
-Vb
Write a Comment
User Comments (0)
About PowerShow.com