Title: Quantum Cryptography
1Quantum Cryptography
- December, 3rd 2007
- Philippe LABOUCHERE
- Annika BEHRENS
2- Introduction
- Photon sources
- Quantum Secret Sharing
3- Introduction
- Photon sources
- Quantum Secret Sharing
4How to measure information (1)
- Claude E. Shannon 1948
- Information entropy
- Mutual information
bits
5How to measure information (2)
- Relation between H and I
- Mutual information between 2 parties
-
-
6Venn diagrams
7The BB84 protocol
8The BB84 protocol principle
- 2 conjugate basis
- Information encoded in photons polarization
- ? 0 /
- ? 1 \
- Quantum classical channels used for key exchange
Charles H. Bennett
Gilles Brassard
9From random bits to a sifted key
Alices random bits 0 1 1 O O 1
Random sending bases D D R R D R
Photon Alice sends / \ /
Random receiving bases R D R D D R
Bits as received by Bob 1 1 1 0 0 1
Bob reports basis of received bits R D R D D R
Alice says which were correct no OK OK no OK OK
Presumably shared information . 1 1 . 0 1
Bob reveals some key bits at random . . 1 . 0 .
Alice confirms them . . OK . OK .
Remaining shared bits . 1 . . . 1
Quantum transmission
Public discussion
10Mutual information vs quantum bit error rate
11The no-cloning theorem
- Dieks, Wootters, Žurek 1982
- It is forbidden to create
- identical copies of an arbitrary unknown quantum
state. - Quantum operations unitary linear
transformations on the state of a quantum system
12- Introduction
- Photon sources
- Quantum Secret Sharing
13Sources of photons
- Thermal light
-
- Coherent light
- Squeezed light
Average photon number of photons in a mode Number
of photons
14Faint-laser pulses
- ltngt µ 0.1 photon / pulse
-
- Photon-number splitting attack!
- Dark counts of detectors vs high pulse rate
weaker pulses
Detection yield Transmission efficiency
!
Tradeoff
15Entangled photon pairs
- Spontaneous
- Parametric
- Down
- Conversion
- Idler photon acts as trigger for signal photon
- Very inefficient
16Single-photon sources
- Intercept/resend attack
- gt error rate lt dark count rate !
- Condition for security
- Drawback dark counts afterpulses
Detection yield
Transmission efficiency
17Practical limits of QC
- Realization of signal
- Stability under the influence of the environment
(transportation) - - Birefringence
- - Polarization dispersion
- - Scattering
- Need of efficient sources detectors
(measurements)
18Bite rate as function of distance after error
correction and privacy amplification
Pulse rate 10 MHz µ 0.1 (faint laser pulses)
Losses _at_ 800nm 2dB / km _at_ 1300 nm 0.35dB
/ km _at_ 1550 nm 0.25 dB /km
19- Introduction
- Photon sources
- Quantum Secret Sharing
20Quantum Secret Sharing (1)
21QSS (2)
- N-qubit GHZ source
- Define
22Goodbye GHZ, welcome single qubit
23Sequentially polarized single photon protocol
Original BB84 Modified BB84
Diagonal and Rectilinear bases Classes X and Y
/ and 0 and \ 1 fj 0, p/2 0 fj p, 3p/2 1
Correlated results if same bases used Correlated results if
24Questions ?