WO2008140290A2 - Qudits in two way deterministic quantum key distribution - Google Patents

Qudits in two way deterministic quantum key distribution Download PDF

Info

Publication number
WO2008140290A2
WO2008140290A2 PCT/MY2008/000038 MY2008000038W WO2008140290A2 WO 2008140290 A2 WO2008140290 A2 WO 2008140290A2 MY 2008000038 W MY2008000038 W MY 2008000038W WO 2008140290 A2 WO2008140290 A2 WO 2008140290A2
Authority
WO
WIPO (PCT)
Prior art keywords
qudits
protocol
key distribution
quantum key
sent
Prior art date
Application number
PCT/MY2008/000038
Other languages
French (fr)
Other versions
WO2008140290A3 (en
Inventor
Mohamed Ridza Wahidin
Jesni Bin Shamsul Shaari
Marco Lucamarni
Original Assignee
Mimos, Berhad
International Islamic University Malaysia
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos, Berhad, International Islamic University Malaysia filed Critical Mimos, Berhad
Publication of WO2008140290A2 publication Critical patent/WO2008140290A2/en
Publication of WO2008140290A3 publication Critical patent/WO2008140290A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding

Definitions

  • the present invention relates to a qudits in two way deterministic quantum key distribution.
  • qubit was basically the leader in quantum key distribution (QKD) in the BB84 protocol.
  • QKD quantum key distribution
  • a higher dimensional system was used wherein the protocol was extendable to the use of qutrits, exhibiting a higher level of security.
  • the two way deterministic protocols emerged with development in various protocols. This involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits.
  • d being a prime number
  • qudit dimensional quantum system
  • the present invention relates to a qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits.
  • a protocol sees Ul sending to U2 a state that Ul prepared and wherein U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to Ul who would then measure or decode the sent state deterministically and wherein in order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding, U2 would do a projective measurements on the qudit received whilst Ul measures the qudit sent by U2. In a noisy channel, the measure of security is essentially translated into the robustness of the protocol.
  • a secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul is greater than the lesser of the information shared between U2 and U3.
  • U3 substitute the noisy channel between Ul and U2 and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode. In a full fraction attack by U3, U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared.
  • Figure 1 shows a graph plotted to show the probability of detection for the generalized protocol (square points) and non-generalized protocol (triangular points) against the number of dimensions.
  • a control mode is necessary. This is randomly done with a certain probability where instead of encoding U2 would do a projective measurements on the qudit in the forward path whilst Ul measures the qudit in the backward path. In the instances wherein U2 choice of basis coincides with Ul's , the measurements should correlate. If this is not the case, an eavesdropper would be detected.
  • a secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul , I AB . is greater than the lesser of the information shared between U2 and U3, IAE , or U 1 and U3, I B E, (IAB > min(lAB, IBE)).
  • IAB 1 - (2d - 1) / (d 2 ) log* (2d - 1) / d 2 ) - ((d - I)/ (d)) 2 log,, (d - 1) / d 2 (1
  • I AE 1 for a full fraction attack by U3, the case is quite different for
  • Uj is the unitary transformation to shift a state in any basis except yth and ⁇ 1 belongs to d different MUB.
  • U3 has the chances of d / (d+1) making a mistake and the probability to avoid detection in both the forward and backward path is 1/d 2 .

Abstract

The present invention relates to a qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits. A protocol sees U1 sending to U2 a state that U1 prepared and wherein U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to U1 who would then measure or decode the sent state deterministically. In order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding. U2 would do a projective measurements on the qudit received whilst U1 measures the qudit sent by U2.

Description

OUDΓΓS IN TWO WAY DETERMINISTIC QUANTUM KEY DISTRIBUTION
FIEI J> OF THF, INVENTION
The present invention relates to a qudits in two way deterministic quantum key distribution.
BACKGROUND OF THE INVENTION
In the prior art the use of qubit was basically the leader in quantum key distribution (QKD) in the BB84 protocol. A higher dimensional system was used wherein the protocol was extendable to the use of qutrits, exhibiting a higher level of security. The two way deterministic protocols emerged with development in various protocols. This involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits.
Generalization to exhaustive use of all the MUB in both the qubit and qutrit case involves nontrivial extensions due to he nonexistence of the unitary universal NOT gate as well as a non go theorem.
In the present invention, the inventors have introduced the use of d (d being a prime number) dimensional quantum system (qudit) in a two way deterministic scheme.
Further to this, a generalized protocol is considered using an encoding recipe for unitary efficiency. The security was compared and efficiencies of the protocols both in the context of theoretical as well as practical efficiencies were recorded.
SUMMARY OF THE INVENTION
The present invention relates to a qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits. A protocol sees Ul sending to U2 a state that Ul prepared and wherein U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to Ul who would then measure or decode the sent state deterministically and wherein in order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding, U2 would do a projective measurements on the qudit received whilst Ul measures the qudit sent by U2. In a noisy channel, the measure of security is essentially translated into the robustness of the protocol.
A secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul is greater than the lesser of the information shared between U2 and U3. U3 substitute the noisy channel between Ul and U2 and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode. In a full fraction attack by U3, U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared.
BRIEF DESCRIPTION OF THE FIGURE
Figure 1 shows a graph plotted to show the probability of detection for the generalized protocol (square points) and non-generalized protocol (triangular points) against the number of dimensions.
DETAILED DESCRPTION OF Tlfe PRESENT INVENTION
In the present invention two users would be used as to better describe the protocol. Wherein the said two users would be referred as User 1 or Ul and User 2 or U2. Subsequent users would be referred as U3, U4 and etc.
In the present invention it would be notice that a protocol sees Ul sending to U2 a state that Ul prepared (also referred as forward path). U2 would then encode the said received protocol with unitary transformation. U2 would then thereafter send the encoded state back to Ul (also referred as backward path) who would then measure or decode the sent state deterministically.
According to the present invention, in order to ensure the security of the protocol, a control mode is necessary. This is randomly done with a certain probability where instead of encoding U2 would do a projective measurements on the qudit in the forward path whilst Ul measures the qudit in the backward path. In the instances wherein U2 choice of basis coincides with Ul's , the measurements should correlate. If this is not the case, an eavesdropper would be detected.
In the case the present invention only use d basis, a U3 may correctly guess only Md times and avoids detection. However, in the case that U3 makes a mistake, she gets to evade detection in both the forward and backward path with probability 1/d2. on average U3 would be detected with probability Pr(Eve) =[(d-l)/d](d2-l)/(d2).
However, in a realistic setup with a noisy channel, the measure of security is essentially translated into the robustness of the protocol; i.e., how much of error could be tolerated before communication becomes insecure. A secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between U2 and Ul , IAB. is greater than the lesser of the information shared between U2 and U3, IAE , or U 1 and U3, IBE, (IAB > min(lAB, IBE)).
In such instance, it could be considered that U3 substitute the noisy channel between them with a perfect one and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode. A full fraction attack would induce an error amounting to e = ((d-l)/d)2 . In other words U3 needs to attack and achieve IAB ≤ min (IAE, IBE). For the purpose of describing the present invention, it is considered that the information shared between the parties, wherein for U2 and U3, the information shared is given as:
IAB = 1 - (2d - 1) / (d2) log* (2d - 1) / d2) - ((d - I)/ (d))2 log,, (d - 1) / d2 (1 Wherein, IAE = 1 for a full fraction attack by U3, the case is quite different for
IBE as U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared. U3's chances of having equal results with Ul about U2's encoding is only (2d-l)/d2 and U3's uncertainty of Ul's result becomes as shown below:-
H (B) = (2d -l)/(d2) logd (2d - l)/(d2) + (d -I)2 /(d2) log* (d - 1) / (d2) (2)
It is straightforward to see that with IBE = 1 - H (B), only when U3 attacks all the qudits would be IBE = UB- In considering the case when we generalize to d+ 1 basis we refer to for a reliable recipe for blind encoding to achieve a protocol of unitary efficiency. Ul would send to U3 d qudits of differing bases and U2 would encode with any of the d* possible transformations.
Figure imgf000006_0001
Wherein a, b, ..... k are different values to encode onto the relevant qudits, Uj is the unitary transformation to shift a state in any basis except yth and φ1 belongs to d different MUB. In an IR attack, U3 has the chances of d / (d+1) making a mistake and the probability to avoid detection in both the forward and backward path is 1/d2. The probability on the whole to detect U3 would be Pr (Evβgcnerauzed) = (d-l)/d.
In term of efficiency of the protocol, it could be considered that only the transmission mode as opposed to the control mode. In the theoretical framework where a channel is considered to be noiseless and lossless, this is not unjustifiable as one may minimize greatly the probability of the control mod, leading to a negligible number of qudits to be discarded. With respect to the practical efficiency, we consider the transmittance of the channel to be T. With the distance between U2 and Ul being L, every qudit would have to travel a distance of 2L. For the generalized protocol, considering every round of communication, the practical efficiency amounts to the overall probability that all the qudits arrive at the end of the round trip: ε = T2"1. As in a realistic setup, wherein
r <l,limf' =0
The practical efficiency is literally zero. Given the fact that probability of detecting U3 for both the protocol asymptotically approaches 1 as d increases.
Hm Pτ(Eve) = Hm ?r(Eve gmmllied ) = 1
It is therefore concluded that the generalized two way protocols become less efficient with increasing dimensions in realistic cases where the transmittance is less than perfect.

Claims

OCLAIMS
1. A qudits in two way deterministic quantum key distribution wherein it involved a two way transmission where qubits are sent to and from between communicating parties while information is encoded by unitary transformers on the qubits characterized in that wherein a protocol sees Ul sending to U2 a state that Ul prepared and wherein U2 would then encode the said received protocol with unitary transformation and wherein U2 would then thereafter send the encoded state back to Ul who would then measure or decode the sent state deteπninistically and wherein in order to ensure the security of the protocol, a control mode used and is randomly done with a certain probability wherein instead of encoding, U2 would do a projective measurements on the qudit received whilst Ul measures the qudit sent by U2.
2. A qudits in two way deterministic quantum key distribution as claimed in Claim
1 wherein with a noisy channel, the measure of security is essentially translated into the robustness of the protocol.
3. A qudits in two way deterministic quantum key distribution as claimed in Claim 1 wherein a secure key can be distilled with the use of standard error correction and privacy amplification procedures only when the information shared between
U2 and Ul is greater than the lesser of the information shared between U2 and
U3.
4. A qudits in two way deterministic quantum key distribution as claimed in Claim
3 wherein U3 substitute the noisy channel between Ul and U2 and attack only certain fractions of the qudits to glean some information whilst inducing a lesser amount of error in the control mode.
5. A qudits in two way deterministic quantum key distribution as claimed in Claim
1 wherein in a full fraction attack by U3, U3 would destroy the information in the qudit when U3 measures it in a different basis that that which Ul has prepared.
PCT/MY2008/000038 2007-05-11 2008-05-09 Qudits in two way deterministic quantum key distribution WO2008140290A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI20070734 MY153146A (en) 2007-05-11 2007-05-11 Qudits in two way deterministic quantum key distribution
MYPI20070734 2007-05-11

Publications (2)

Publication Number Publication Date
WO2008140290A2 true WO2008140290A2 (en) 2008-11-20
WO2008140290A3 WO2008140290A3 (en) 2009-03-12

Family

ID=40002764

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2008/000038 WO2008140290A2 (en) 2007-05-11 2008-05-09 Qudits in two way deterministic quantum key distribution

Country Status (2)

Country Link
MY (1) MY153146A (en)
WO (1) WO2008140290A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018089850A1 (en) * 2016-11-10 2018-05-17 Liang Jiang Generalized quantum channels
US10540602B2 (en) 2015-02-27 2020-01-21 Yale University Techniques of oscillator control for quantum information processing and related systems and methods
US11106991B2 (en) 2015-02-27 2021-08-31 Yale University Techniques for universal quantum control of quantum coherent states and related systems and methods
US11263546B2 (en) 2015-07-24 2022-03-01 Yale University Techniques of oscillator state manipulation for quantum information processing and related systems and methods
US11451231B2 (en) 2018-01-05 2022-09-20 Yale University Robust quantum logical gates

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050135627A1 (en) * 2003-12-22 2005-06-23 Anton Zavriyev Two-way QKD system with active compensation
US20050152540A1 (en) * 2003-12-04 2005-07-14 Barbosa Geraldo A. Fast multi-photon key distribution scheme secured by quantum noise
US20060045527A1 (en) * 2004-09-02 2006-03-02 Nec Corporation Multiplexing communication system and crosstalk elimination method
US20070076883A1 (en) * 2005-09-30 2007-04-05 Nortel Networks Limited Any-point-to-any-point ("AP2AP") quantum key distribution protocol for optical ring network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050152540A1 (en) * 2003-12-04 2005-07-14 Barbosa Geraldo A. Fast multi-photon key distribution scheme secured by quantum noise
US20050135627A1 (en) * 2003-12-22 2005-06-23 Anton Zavriyev Two-way QKD system with active compensation
US20060045527A1 (en) * 2004-09-02 2006-03-02 Nec Corporation Multiplexing communication system and crosstalk elimination method
US20070076883A1 (en) * 2005-09-30 2007-04-05 Nortel Networks Limited Any-point-to-any-point ("AP2AP") quantum key distribution protocol for optical ring network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SHAARI,J.S ET AL.: 'Qunits in two way quantum key distribution' FIRST INTERNATIONAL CONFERENCE ON QUANTUM,NANO AND MICRO TECHNOLOGIES 2007 January 2007, pages 1 - 11 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10540602B2 (en) 2015-02-27 2020-01-21 Yale University Techniques of oscillator control for quantum information processing and related systems and methods
US11106991B2 (en) 2015-02-27 2021-08-31 Yale University Techniques for universal quantum control of quantum coherent states and related systems and methods
US11263546B2 (en) 2015-07-24 2022-03-01 Yale University Techniques of oscillator state manipulation for quantum information processing and related systems and methods
WO2018089850A1 (en) * 2016-11-10 2018-05-17 Liang Jiang Generalized quantum channels
US10776709B2 (en) 2016-11-10 2020-09-15 Yale University Generalized quantum channels
US11451231B2 (en) 2018-01-05 2022-09-20 Yale University Robust quantum logical gates

Also Published As

Publication number Publication date
WO2008140290A3 (en) 2009-03-12
MY153146A (en) 2014-12-31

Similar Documents

Publication Publication Date Title
CN101207628B (en) Method and system for managing shared information
Lucamarini et al. Secure deterministic communication without entanglement
Ekert et al. Eavesdropping on quantum-cryptographical systems
Yuen Key generation: Foundations and a new quantum approach
Gupta et al. A novel and efficient lattice‐based authenticated key exchange protocol in C‐K model
Lai et al. Authentication over noisy channels
Huang et al. State-discrimination attack on discretely modulated continuous-variable quantum key distribution
CN111447056B (en) Configurable decoy state quantum digital signature method
Cachin Digital Steganography.
WO2008140290A2 (en) Qudits in two way deterministic quantum key distribution
CA2506516C (en) Quantum cryptography protocol
CN110061787B (en) Bell state-based semi-quantum secure direct communication method and system
CN113726516A (en) Three-party quantum secure direct communication method based on independence of two degrees of freedom measurement equipment
WO2021213631A1 (en) Improved cryptographic method and system
He et al. Two-party quantum key agreement based on four-particle GHZ states
Lo et al. Quantum cryptography: from theory to practice
González Vasco et al. Group key establishment in a quantum-future scenario
WO2014069984A1 (en) Multi-user steganography based on greenberger-horne-zeilinger states
He Simple quantum protocols for the millionaire problem with a semi-honest third party
CN110247768B (en) Certificable semi-quantum secret sharing method and system based on GHZ state
CN109495262B (en) Quantum key distribution method with dense coding characteristic in quantum communication network
Li et al. Deterministic quantum secure direct communication protocol based on hyper-entangled state
Gyongyosi Scalar Reconciliation for Gaussian Modulation of Two-Way Continuousvariable Quantum Key Distribution
Teja et al. Quantum cryptography: state-of-art, challenges and future perspectives
Ardehali et al. Efficient quantum key distribution

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08753727

Country of ref document: EP

Kind code of ref document: A2

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08753727

Country of ref document: EP

Kind code of ref document: A2