WO2008140290A2 - Qudits in two way deterministic quantum key distribution - Google Patents
Qudits in two way deterministic quantum key distribution Download PDFInfo
- Publication number
- WO2008140290A2 WO2008140290A2 PCT/MY2008/000038 MY2008000038W WO2008140290A2 WO 2008140290 A2 WO2008140290 A2 WO 2008140290A2 MY 2008000038 W MY2008000038 W MY 2008000038W WO 2008140290 A2 WO2008140290 A2 WO 2008140290A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- qudits
- protocol
- key distribution
- quantum key
- sent
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
Definitions
- the present invention relates to a qudits in two way deterministic quantum key distribution.
- qubit was basically the leader in quantum key distribution (QKD) in the BB84 protocol.
- QKD quantum key distribution
- a higher dimensional system was used wherein the protocol was extendable to the use of qutrits, exhibiting a higher level of security.
- the two way deterministic protocols emerged with development in various protocols. This involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits.
- d being a prime number
- qudit dimensional quantum system
- the present invention relates to a qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits.
- a protocol sees Ul sending to U2 a state that Ul prepared and wherein U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to Ul who would then measure or decode the sent state deterministically and wherein in order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding, U2 would do a projective measurements on the qudit received whilst Ul measures the qudit sent by U2. In a noisy channel, the measure of security is essentially translated into the robustness of the protocol.
- a secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul is greater than the lesser of the information shared between U2 and U3.
- U3 substitute the noisy channel between Ul and U2 and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode. In a full fraction attack by U3, U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared.
- Figure 1 shows a graph plotted to show the probability of detection for the generalized protocol (square points) and non-generalized protocol (triangular points) against the number of dimensions.
- a control mode is necessary. This is randomly done with a certain probability where instead of encoding U2 would do a projective measurements on the qudit in the forward path whilst Ul measures the qudit in the backward path. In the instances wherein U2 choice of basis coincides with Ul's , the measurements should correlate. If this is not the case, an eavesdropper would be detected.
- a secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul , I AB . is greater than the lesser of the information shared between U2 and U3, IAE , or U 1 and U3, I B E, (IAB > min(lAB, IBE)).
- IAB 1 - (2d - 1) / (d 2 ) log* (2d - 1) / d 2 ) - ((d - I)/ (d)) 2 log,, (d - 1) / d 2 (1
- I AE 1 for a full fraction attack by U3, the case is quite different for
- Uj is the unitary transformation to shift a state in any basis except yth and ⁇ 1 belongs to d different MUB.
- U3 has the chances of d / (d+1) making a mistake and the probability to avoid detection in both the forward and backward path is 1/d 2 .
Abstract
The present invention relates to a qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits. A protocol sees U1 sending to U2 a state that U1 prepared and wherein U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to U1 who would then measure or decode the sent state deterministically. In order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding. U2 would do a projective measurements on the qudit received whilst U1 measures the qudit sent by U2.
Description
OUDΓΓS IN TWO WAY DETERMINISTIC QUANTUM KEY DISTRIBUTION
FIEI J> OF THF, INVENTION
The present invention relates to a qudits in two way deterministic quantum key distribution.
BACKGROUND OF THE INVENTION
In the prior art the use of qubit was basically the leader in quantum key distribution (QKD) in the BB84 protocol. A higher dimensional system was used wherein the protocol was extendable to the use of qutrits, exhibiting a higher level of security. The two way deterministic protocols emerged with development in various protocols. This involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits.
Generalization to exhaustive use of all the MUB in both the qubit and qutrit case involves nontrivial extensions due to he nonexistence of the unitary universal NOT gate as well as a non go theorem.
In the present invention, the inventors have introduced the use of d (d being a prime number) dimensional quantum system (qudit) in a two way deterministic scheme.
Further to this, a generalized protocol is considered using an encoding recipe for unitary efficiency. The security was compared and efficiencies of the protocols both in the context of theoretical as well as practical efficiencies were recorded.
SUMMARY OF THE INVENTION
The present invention relates to a qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary
transformers on the qubits. A protocol sees Ul sending to U2 a state that Ul prepared and wherein U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to Ul who would then measure or decode the sent state deterministically and wherein in order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding, U2 would do a projective measurements on the qudit received whilst Ul measures the qudit sent by U2. In a noisy channel, the measure of security is essentially translated into the robustness of the protocol.
A secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul is greater than the lesser of the information shared between U2 and U3. U3 substitute the noisy channel between Ul and U2 and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode. In a full fraction attack by U3, U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared.
BRIEF DESCRIPTION OF THE FIGURE
Figure 1 shows a graph plotted to show the probability of detection for the generalized protocol (square points) and non-generalized protocol (triangular points) against the number of dimensions.
DETAILED DESCRPTION OF Tlfe PRESENT INVENTION
In the present invention two users would be used as to better describe the protocol. Wherein the said two users would be referred as User 1 or Ul and User 2 or U2. Subsequent users would be referred as U3, U4 and etc.
In the present invention it would be notice that a protocol sees Ul sending to U2 a state that Ul prepared (also referred as forward path). U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the
encoded state back to Ul (also referred as backward path) who would then measure or decode the sent state deterministically.
According to the present invention, in order to ensure the security of the protocol, a control mode is necessary. This is randomly done with a certain probability where instead of encoding U2 would do a projective measurements on the qudit in the forward path whilst Ul measures the qudit in the backward path. In the instances wherein U2 choice of basis coincides with Ul's , the measurements should correlate. If this is not the case, an eavesdropper would be detected.
In the case the present invention only use d basis, a U3 may correctly guess only Md times and avoids detection. However, in the case that U3 makes a mistake, she gets to evade detection in both the forward and backward path with probability 1/d2. on average U3 would be detected with probability Pr(Eve) =[(d-l)/d](d2-l)/(d2).
However, in a realistic setup with a noisy channel, the measure of security is essentially translated into the robustness of the protocol; i.e., how much of error could be tolerated before communication becomes insecure. A secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul , IAB. is greater than the lesser of the information shared between U2 and U3, IAE , or U 1 and U3, IBE, (IAB > min(lAB, IBE)).
In such instance, it could be considered that U3 substitute the noisy channel between them with a perfect one and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode. A full fraction attack would induce an error amounting to e = ((d-l)/d)2 . In other words U3 needs to attack and achieve IAB ≤ min (IAE, IBE). For the purpose of describing the present invention, it is considered that the information shared between the parties, wherein for U2 and U3, the information shared is given as:
IAB = 1 - (2d - 1) / (d2) log* (2d - 1) / d2) - ((d - I)/ (d))2 log,, (d - 1) / d2 (1
Wherein, IAE = 1 for a full fraction attack by U3, the case is quite different for
IBE as U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared. U3's chances of having equal results with Ul about U2's encoding is only (2d-l)/d2 and U3's uncertainty of Ul's result becomes as shown below:-
H (B) = (2d -l)/(d2) logd (2d - l)/(d2) + (d -I)2 /(d2) log* (d - 1) / (d2) (2)
It is straightforward to see that with IBE = 1 - H (B), only when U3 attacks all the qudits would be IBE = UB- In considering the case when we generalize to d+ 1 basis we refer to for a reliable recipe for blind encoding to achieve a protocol of unitary efficiency. Ul would send to U3 d qudits of differing bases and U2 would encode with any of the d* possible transformations.
Wherein a, b, ..... k are different values to encode onto the relevant qudits, Uj is the unitary transformation to shift a state in any basis except yth and φ1 belongs to d different MUB. In an IR attack, U3 has the chances of d / (d+1) making a mistake and the probability to avoid detection in both the forward and backward path is 1/d2. The probability on the whole to detect U3 would be Pr (Evβgcnerauzed) = (d-l)/d.
In term of efficiency of the protocol, it could be considered that only the transmission mode as opposed to the control mode. In the theoretical framework where a channel is considered to be noiseless and lossless, this is not unjustifiable as one may minimize greatly the probability of the control mod, leading to a negligible number of qudits to be discarded. With respect to the practical efficiency, we consider the transmittance of the channel to be T. With the distance between U2 and Ul being L, every qudit would have to travel a distance of 2L. For the generalized protocol, considering every round of communication, the practical efficiency amounts to the
overall probability that all the qudits arrive at the end of the round trip: ε = T2"1. As in a realistic setup, wherein
r <l,limf' =0
The practical efficiency is literally zero. Given the fact that probability of detecting U3 for both the protocol asymptotically approaches 1 as d increases.
Hm Pτ(Eve) = Hm ?r(Eve gmmllied ) = 1
It is therefore concluded that the generalized two way protocols become less efficient with increasing dimensions in realistic cases where the transmittance is less than perfect.
Claims
1. A qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits characterized in that wherein a protocol sees Ul sending to U2 a state that Ul prepared and wherein U2 would then encode the said received protocol with unitary transformation and wherein U2 would then thereafter send the encoded state back to Ul who would then measure or decode the sent state deteπninistically and wherein in order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding, U2 would do a projective measurements on the qudit received whilst Ul measures the qudit sent by U2.
2. A qudits in two way deterministic quantum key distribution as claimed in Claim
1 wherein with a noisy channel, the measure of security is essentially translated into the robustness of the protocol.
3. A qudits in two way deterministic quantum key distribution as claimed in Claim 1 wherein a secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between
U2 and Ul is greater than the lesser of the information shared between U2 and
U3.
4. A qudits in two way deterministic quantum key distribution as claimed in Claim
3 wherein U3 substitute the noisy channel between Ul and U2 and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode.
5. A qudits in two way deterministic quantum key distribution as claimed in Claim
1 wherein in a full fraction attack by U3, U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20070734 MY153146A (en) | 2007-05-11 | 2007-05-11 | Qudits in two way deterministic quantum key distribution |
MYPI20070734 | 2007-05-11 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008140290A2 true WO2008140290A2 (en) | 2008-11-20 |
WO2008140290A3 WO2008140290A3 (en) | 2009-03-12 |
Family
ID=40002764
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/MY2008/000038 WO2008140290A2 (en) | 2007-05-11 | 2008-05-09 | Qudits in two way deterministic quantum key distribution |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY153146A (en) |
WO (1) | WO2008140290A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018089850A1 (en) * | 2016-11-10 | 2018-05-17 | Liang Jiang | Generalized quantum channels |
US10540602B2 (en) | 2015-02-27 | 2020-01-21 | Yale University | Techniques of oscillator control for quantum information processing and related systems and methods |
US11106991B2 (en) | 2015-02-27 | 2021-08-31 | Yale University | Techniques for universal quantum control of quantum coherent states and related systems and methods |
US11263546B2 (en) | 2015-07-24 | 2022-03-01 | Yale University | Techniques of oscillator state manipulation for quantum information processing and related systems and methods |
US11451231B2 (en) | 2018-01-05 | 2022-09-20 | Yale University | Robust quantum logical gates |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050135627A1 (en) * | 2003-12-22 | 2005-06-23 | Anton Zavriyev | Two-way QKD system with active compensation |
US20050152540A1 (en) * | 2003-12-04 | 2005-07-14 | Barbosa Geraldo A. | Fast multi-photon key distribution scheme secured by quantum noise |
US20060045527A1 (en) * | 2004-09-02 | 2006-03-02 | Nec Corporation | Multiplexing communication system and crosstalk elimination method |
US20070076883A1 (en) * | 2005-09-30 | 2007-04-05 | Nortel Networks Limited | Any-point-to-any-point ("AP2AP") quantum key distribution protocol for optical ring network |
-
2007
- 2007-05-11 MY MYPI20070734 patent/MY153146A/en unknown
-
2008
- 2008-05-09 WO PCT/MY2008/000038 patent/WO2008140290A2/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050152540A1 (en) * | 2003-12-04 | 2005-07-14 | Barbosa Geraldo A. | Fast multi-photon key distribution scheme secured by quantum noise |
US20050135627A1 (en) * | 2003-12-22 | 2005-06-23 | Anton Zavriyev | Two-way QKD system with active compensation |
US20060045527A1 (en) * | 2004-09-02 | 2006-03-02 | Nec Corporation | Multiplexing communication system and crosstalk elimination method |
US20070076883A1 (en) * | 2005-09-30 | 2007-04-05 | Nortel Networks Limited | Any-point-to-any-point ("AP2AP") quantum key distribution protocol for optical ring network |
Non-Patent Citations (1)
Title |
---|
SHAARI,J.S ET AL.: 'Qunits in two way quantum key distribution' FIRST INTERNATIONAL CONFERENCE ON QUANTUM,NANO AND MICRO TECHNOLOGIES 2007 January 2007, pages 1 - 11 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10540602B2 (en) | 2015-02-27 | 2020-01-21 | Yale University | Techniques of oscillator control for quantum information processing and related systems and methods |
US11106991B2 (en) | 2015-02-27 | 2021-08-31 | Yale University | Techniques for universal quantum control of quantum coherent states and related systems and methods |
US11263546B2 (en) | 2015-07-24 | 2022-03-01 | Yale University | Techniques of oscillator state manipulation for quantum information processing and related systems and methods |
WO2018089850A1 (en) * | 2016-11-10 | 2018-05-17 | Liang Jiang | Generalized quantum channels |
US10776709B2 (en) | 2016-11-10 | 2020-09-15 | Yale University | Generalized quantum channels |
US11451231B2 (en) | 2018-01-05 | 2022-09-20 | Yale University | Robust quantum logical gates |
Also Published As
Publication number | Publication date |
---|---|
WO2008140290A3 (en) | 2009-03-12 |
MY153146A (en) | 2014-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101207628B (en) | Method and system for managing shared information | |
Lucamarini et al. | Secure deterministic communication without entanglement | |
Ekert et al. | Eavesdropping on quantum-cryptographical systems | |
Yuen | Key generation: Foundations and a new quantum approach | |
Gupta et al. | A novel and efficient lattice‐based authenticated key exchange protocol in C‐K model | |
Lai et al. | Authentication over noisy channels | |
Huang et al. | State-discrimination attack on discretely modulated continuous-variable quantum key distribution | |
CN111447056B (en) | Configurable decoy state quantum digital signature method | |
Cachin | Digital Steganography. | |
WO2008140290A2 (en) | Qudits in two way deterministic quantum key distribution | |
CA2506516C (en) | Quantum cryptography protocol | |
CN110061787B (en) | Bell state-based semi-quantum secure direct communication method and system | |
CN113726516A (en) | Three-party quantum secure direct communication method based on independence of two degrees of freedom measurement equipment | |
WO2021213631A1 (en) | Improved cryptographic method and system | |
He et al. | Two-party quantum key agreement based on four-particle GHZ states | |
Lo et al. | Quantum cryptography: from theory to practice | |
González Vasco et al. | Group key establishment in a quantum-future scenario | |
WO2014069984A1 (en) | Multi-user steganography based on greenberger-horne-zeilinger states | |
He | Simple quantum protocols for the millionaire problem with a semi-honest third party | |
CN110247768B (en) | Certificable semi-quantum secret sharing method and system based on GHZ state | |
CN109495262B (en) | Quantum key distribution method with dense coding characteristic in quantum communication network | |
Li et al. | Deterministic quantum secure direct communication protocol based on hyper-entangled state | |
Gyongyosi | Scalar Reconciliation for Gaussian Modulation of Two-Way Continuousvariable Quantum Key Distribution | |
Teja et al. | Quantum cryptography: state-of-art, challenges and future perspectives | |
Ardehali et al. | Efficient quantum key distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08753727 Country of ref document: EP Kind code of ref document: A2 |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase in: |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08753727 Country of ref document: EP Kind code of ref document: A2 |