Quantum Cryptography: from Theory to Practice

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Cryptography: from Theory to Practice Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements arXiv:0808.1385v1 [quant-ph] 10 Aug 2008 for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto Copyright c 2008 by Xiongfeng Ma Abstract Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptog- raphy was proven in the last decade. Many security analyses are based on the assumption that QKD system components are idealized. In practice, inevitable device imperfections may compromise security unless these imperfections are well investigated. A highly attenuated laser pulse which gives a weak coherent state is widely used in QKD experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we will prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we will apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Fur- thermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. Note that our work, decoy state protocol, has attracted a lot of scientific and media interest. The decoy state QKD becomes a standard technique for prepare-and-measure QKD schemes. Aside from single-photon-based QKD schemes, there is another type of scheme based on entangled photon sources. A PDC source is commonly used as an entangled photon source. We propose a model and post-processing scheme for the entanglement-based QKD with a PDC source. Although the model is proposed to study the entanglement- based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. By simulating a real PDC experiment, we show that the entanglement-based QKD can achieve longer maximal secure distance than the single-photon-based QKD schemes. ii We propose a time-shift attack that exploits the efficiency mismatch of two single photon detectors in a QKD system. This eavesdropping strategy can be realized by current technology. We will also discuss counter measures against the attack and study the security of a QKD system with efficiency mismatch detectors. iii Acknowledgements The research presented in this Doctor of Philosophy thesis is carried out under the the supervision of Prof. Hoi-Kwong Lo in the Department of Physics at the University of Toronto. I owe my most sincere thanks to Hoi-Kwong for sharing his extensive knowledge with me. I can still clearly remember the time when I went to his office every week and struggled to understand the GLLP security analysis, how I was disappointed by my first simulation result, and how happy I was when I finished the simulation work for the decoy state method inspired by his conference paper. I am very grateful for his support of my non-academic life as well. During my graduate study, I was lucky enough to be surrounded by wonderful col- leagues: Jean-Christian Boileau, Ryan Bolen, Kai Chen, Marcos Curty, Fr´ed´eric Dupuis, Ben Fortescue, Chi-Hang Fred Fung, Leilei Huang, Bing Qi, Li Qian, Kiyoshi Tamaki, Yi Zhao etc. In particular, I would like to thank Bing Qi for enormously helpful and enjoyable discussions about models, experimental setups and security analysis. I wish to express my warm and sincere thanks to researchers in the field who have helped along the way and influenced the formation of the understanding and approach to quantum cryptography presented in this thesis. I would like to acknowledge that I have benefited very much from thoughtful discussions with Norbert L¨utkenhaus, Jian- Wei Pan, Aephraim M. Steinberg, Wolfgang Tittel, Gregor Weihs and the members of their research groups. I would like to thank Ms. Serena Ma for her suggestions and proofreading. Respon- sibility for any remaining errors and omissions rests entirely with the author. I gratefully acknowledge the financial support from the Chinese Government Award for Outstanding Self-financed Students Abroad and the Lachlan Gilchrist Fellowship. Furthermore, my warm thanks are extended to the members of the Department of Physics, the Chinese Students and Scholars Association at the University of Toronto and the Student Diversity Group. With them, I enjoyed a colorful life as a graduate student at the University of Toronto. Finally, and most importantly, I would like to thank my family for their constant and unending love and support. This thesis is dedicated to my parents, which without them, none of this would have been even possible. iv Contents 1 Introduction 1 1.1 Background .................................. 1 1.1.1 Quantuminformationprocessing . 1 1.1.2 Cryptography ............................. 2 1.1.3 Quantumcryptography. 4 1.1.4 Cryptanalysis and Quantum Cryptanalysis . ... 6 1.2 Preliminary .................................. 6 1.2.1 AQKDscenario ........................... 6 1.2.2 QKDperformance .......................... 7 1.3 Motivation................................... 8 1.3.1 QKDsecurity ............................. 8 1.3.2 A gap between theory and experiment . 8 1.4 HighlightandOutline ............................ 9 1.5 Futureoutlook ................................ 11 2 Security analysis 12 2.1 Whataresecurityproofs? . 12 2.2 Squashmodel ................................. 13 2.2.1 Acalibrationproblem . 13 2.2.2 Squashmodel ............................. 13 2.2.3 Remarks................................ 14 2.3 Entanglement-basedQKD . .. .. 15 2.4 Single-photon-basedQKD . 16 2.5 GLLPsecurityanalysis. 19 2.5.1 Taggedanduntaggedqubits . 19 2.5.2 Post-processing ............................ 19 v 2.5.3 Anextension ............................. 20 2.6 GLLP vs. L¨utkenhaus’ security analysis . ...... 21 3 Setup and Model 23 3.1 QKDsetup .................................. 23 3.2 QKDmodel .................................. 24 3.2.1 Weakcoherentstatesource . 24 3.2.2 Channelanddetection . 26 3.2.3 Photonnumberchannelmodel. 27 3.3 QKDhardware ................................ 28 3.3.1 Lasersource.............................. 28 3.3.2 Channel ................................ 28 3.3.3 Detection ............................... 29 4 Decoy state 31 4.1 Decoystate .................................. 31 4.1.1 Motivation............................... 32 4.1.2 Solution ................................ 32 4.1.3 Discussion............................... 33 4.1.4 Simulation............................... 34 4.2 UpperBounds................................. 35 4.2.1 Distanceupperbound . .. .. 35 4.2.2 Keyrateupperbound ........................ 36 4.3 Discussion................................... 37 5 Practical decoy state 38 5.1 Practicalproposals .............................. 38 5.1.1 Vacuum+Weakdecoy. 39 5.1.2 Onedecoy............................... 41 5.1.3 Numericalmethod .......................... 42 5.2 Statisticalfluctuationanalysis . ..... 44 5.2.1 Whatparametersarefluctuating? . 44 5.2.2 StandardErrorAnalysis . 47 5.2.3 Choice of Ns, Nvac, Nw and ν .................... 48 5.3 Simulation................................... 49 vi 5.4 Experimentaldemonstrations . .. 53 5.4.1 Howtogeneratedecoystates . 53 5.4.2 Experimental data post-processing . .. 54 5.5 Conclusion................................... 55 6 Decoy state QKD with 2-LOCC 56 6.1 2-LOCCEDP................................. 56 6.1.1 Gottesman-LoEDP.......................... 57 6.1.2 RecurrenceEDPscheme . 60 6.1.3 Boundsoferrorrates. .. .. 61 6.2 Decoy+GLLP+Gottesman-LoEDP . 63 6.3 Decoy+GLLP+RecurrenceEDP . 67 6.4 Conclusion................................... 70 7 Triggering PDC QKD 71 7.1 Background .................................. 72 7.2 Experimentsetup............................... 74 7.3 Model ..................................... 76 7.3.1 OnAlice’sside ............................ 76 7.3.2 Thresholddetector . .. .. 77 7.3.3 Perfect photon-number resolving detector . ..... 78 7.4 Post-processing ................................ 79 7.4.1 Non-decoy states with threshold detectors . .... 80 7.4.2 Infinite active decoy state with threshold detectors . ....... 80 7.4.3 Weak active decoy state with threshold detectors . ..... 81 7.4.4 Passivedecoystate .......................... 82 7.4.5 Passive decoy state with threshold detectors . ..... 83 7.4.6 With a perfect photon-number resolving detector . ..... 84 7.4.7 Afewremarks............................. 84 7.5 Simulation................................... 85 7.5.1 Without statistical fluctuations . .. 86 7.5.2 Withstatisticalfluctuations . 88 7.6 Conclusion................................... 90 vii 8 Entanglement-based QKD 92 8.1 Introduction.................................. 93 8.2 Implementation ................................ 94 8.2.1 Sourceinthemiddle ......................... 95 8.2.2 SourceonAlice’sside. .. .. 95 8.3 Model ..................................... 96 8.3.1 AnentangledPDCsource . 96 8.3.2 Detection ............................... 97 8.4 Post-processing ................................ 98 8.5 Simulation..................................
Recommended publications
  • A New Family of Fault Tolerant Quantum Reed-Muller Codes
    Clemson University TigerPrints All Theses Theses December 2020 A New Family of Fault Tolerant Quantum Reed-Muller Codes Harrison Beam Eggers Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_theses Recommended Citation Eggers, Harrison Beam, "A New Family of Fault Tolerant Quantum Reed-Muller Codes" (2020). All Theses. 3463. https://tigerprints.clemson.edu/all_theses/3463 This Thesis is brought to you for free and open access by the Theses at TigerPrints. It has been accepted for inclusion in All Theses by an authorized administrator of TigerPrints. For more information, please contact [email protected]. A New Family of Fault Tolerant Quantum Reed-Muller Codes A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Master of Science Mathematics by Harrison Eggers December 2020 Accepted by: Dr. Felice Manganiello, Committee Chair Dr. Shuhong Gao Dr. Kevin James Abstract Fault tolerant quantum computation is a critical step in the development of practical quan- tum computers. Unfortunately, not every quantum error correcting code can be used for fault tolerant computation. Rengaswamy et. al. define CSS-T codes, which are CSS codes that admit the transversal application of the T gate, which is a key step in achieving fault tolerant computation. They then present a family of quantum Reed-Muller fault tolerant codes. Their family of codes admits a transversal T gate, but the asymptotic rate of the family is zero. We build on their work by reframing their CSS-T conditions using the concept of self-orthogonality.
    [Show full text]
  • Quantum Cryptography: from Theory to Practice
    Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto Copyright °c 2008 by Xiongfeng Ma Abstract Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptog- raphy was proven in the last decade. Many security analyses are based on the assumption that QKD system components are idealized. In practice, inevitable device imperfections may compromise security unless these imperfections are well investigated. A highly attenuated laser pulse which gives a weak coherent state is widely used in QKD experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we will prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we will apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Fur- thermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. Note that our work, decoy state protocol, has attracted a lot of scienti¯c and media interest. The decoy state QKD becomes a standard technique for prepare-and-measure QKD schemes.
    [Show full text]
  • Pilot Quantum Error Correction for Global
    Pilot Quantum Error Correction for Global- Scale Quantum Communications Laszlo Gyongyosi*1,2, Member, IEEE, Sandor Imre1, Member, IEEE 1Quantum Technologies Laboratory, Department of Telecommunications Budapest University of Technology and Economics 2 Magyar tudosok krt, H-1111, Budapest, Hungary 2Information Systems Research Group, Mathematics and Natural Sciences Hungarian Academy of Sciences H-1518, Budapest, Hungary *[email protected] Real global-scale quantum communications and quantum key distribution systems cannot be implemented by the current fiber and free-space links. These links have high attenuation, low polarization-preserving capability or extreme sensitivity to the environment. A potential solution to the problem is the space-earth quantum channels. These channels have no absorption since the signal states are propagated in empty space, however a small fraction of these channels is in the atmosphere, which causes slight depolarizing effect. Furthermore, the relative motion of the ground station and the satellite causes a rotation in the polarization of the quantum states. In the current approaches to compensate for these types of polarization errors, high computational costs and extra physical apparatuses are required. Here we introduce a novel approach which breaks with the traditional views of currently developed quantum-error correction schemes. The proposed solution can be applied to fix the polarization errors which are critical in space-earth quantum communication systems. The channel coding scheme provides capacity-achieving communication over slightly depolarizing space-earth channels. I. Introduction Quantum error-correction schemes use different techniques to correct the various possible errors which occur in a quantum channel. In the first decade of the 21st century, many revolutionary properties of quantum channels were discovered [12-16], [19-22] however the efficient error- correction in quantum systems is still a challenge.
    [Show full text]
  • Fault-Tolerant Quantum Gates Ph/CS 219 2 February 2011
    Fault-tolerant quantum gates Ph/CS 219 2 February 2011 Last time we considered the requirements for fault-tolerant quantum gates that act nontrivially on the codespace of a quantum error-correcting code. In the special case of a code that corrects t=1 error, the requirements are: -- if the gate gadget is ideal (has no faults) and its input is a codeword, then the gadget realizes the encoded operation U acting on the code space. -- if the gate gadget is ideal and its input has at most one error (is one-deviated from the codespace), then the output has at most one error in each output block. -- if the gate has one fault and its input has no errors, then the output has at most one error in each block (the errors are correctable). We considered the Clifford group, the finite subgroup of the m-qubit unitary group generated by the Hadamard gate H, the phase gate P (rotation by Pi/2 about the z-axis) and the CNOT gate. For a special class of codes, the generators of the Clifford group can be executed transversally (i.e., bitwise). The logical U can be done by applying a product of n U (or inverse of U) gates in parallel (where n is the code's length). If we suppose that the number of encoded qubits is k=1, then: -- the CNOT gate is transversal for any CSS code. -- the H gate is transversal for a CSS code that uses the same classical code to correct X errors and Z errors.
    [Show full text]
  • Models of Quantum Complexity Growth
    Models of quantum complexity growth Fernando G.S.L. Brand~ao,a;b;c;d Wissam Chemissany,b Nicholas Hunter-Jones,* e;b Richard Kueng,* b;c John Preskillb;c;d aAmazon Web Services, AWS Center for Quantum Computing, Pasadena, CA bInstitute for Quantum Information and Matter, California Institute of Technology, Pasadena, CA 91125 cDepartment of Computing and Mathematical Sciences, California Institute of Technology, Pasadena, CA 91125 dWalter Burke Institute for Theoretical Physics, California Institute of Technology, Pasadena, CA 91125 ePerimeter Institute for Theoretical Physics, Waterloo, ON N2L 2Y5 *Corresponding authors: [email protected] and [email protected] Abstract: The concept of quantum complexity has far-reaching implications spanning theoretical computer science, quantum many-body physics, and high energy physics. The quantum complexity of a unitary transformation or quantum state is defined as the size of the shortest quantum computation that executes the unitary or prepares the state. It is reasonable to expect that the complexity of a quantum state governed by a chaotic many- body Hamiltonian grows linearly with time for a time that is exponential in the system size; however, because it is hard to rule out a short-cut that improves the efficiency of a computation, it is notoriously difficult to derive lower bounds on quantum complexity for particular unitaries or states without making additional assumptions. To go further, one may study more generic models of complexity growth. We provide a rigorous connection between complexity growth and unitary k-designs, ensembles which capture the randomness of the unitary group. This connection allows us to leverage existing results about design growth to draw conclusions about the growth of complexity.
    [Show full text]
  • Security of Quantum Key Distribution with Multiphoton Components
    Security of quantum key distribution with multiphoton components 1,2, 1,2, 1,2 1,2 Hua-Lei Yin ∗, Yao Fu ∗, Yingqiu Mao & Zeng-Bing Chen 1Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China 2The CAS Center for Excellence in QIQP and the Synergetic Innovation Center for QIQP, Uni- versity of Science and Technology of China, Hefei, Anhui 230026, China ∗ These authors contributed equally to this work. Correspondence and requests for materials should be addressed to H.-L.Y. (email: [email protected]) or Z.-B.C. (email: [email protected]) Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin- Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be ex- tracted from the two-photon component by modifying the classical post-processing proce- dure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four arXiv:1607.02366v1 [quant-ph] 8 Jul 2016 photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three- photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works.
    [Show full text]
  • Arxiv:2104.09539V1 [Quant-Ph] 19 Apr 2021
    Practical quantum error correction with the XZZX code and Kerr-cat qubits Andrew S. Darmawan,1, 2 Benjamin J. Brown,3 Arne L. Grimsmo,3 David K. Tuckett,3 and Shruti Puri4, 5 1Yukawa Institute for Theoretical Physics (YITP), Kyoto University, Kitashirakawa Oiwakecho, Sakyo-ku, Kyoto 606-8502, Japan∗ 2JST, PRESTO, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012, Japan 3Centre for Engineered Quantum Systems, School of Physics, University of Sydney, Sydney, New South Wales 2006, Australia 4 Department of Applied Physics, Yale University, New Haven, Connecticut 06511, USAy 5Yale Quantum Institute, Yale University, New Haven, Connecticut 06511, USA (Dated: April 21, 2021) The development of robust architectures capable of large-scale fault-tolerant quantum computa- tion should consider both their quantum error-correcting codes, and the underlying physical qubits upon which they are built, in tandem. Following this design principle we demonstrate remarkable error correction performance by concatenating the XZZX surface code with Kerr-cat qubits. We contrast several variants of fault-tolerant systems undergoing different circuit noise models that reflect the physics of Kerr-cat qubits. Our simulations show that our system is scalable below a threshold gate infidelity of pCX 6:5% within a physically reasonable parameter regime, where ∼ pCX is the infidelity of the noisiest gate of our system; the controlled-not gate. This threshold can be reached in a superconducting circuit architecture with a Kerr-nonlinearity of 10MHz, a 6:25 photon cat qubit, single-photon lifetime of > 64µs, and thermal photon population < 8%.∼ Such parameters are routinely achieved in superconducting∼ circuits. ∼ I. INTRODUCTION qubit [22, 34, 35].
    [Show full text]
  • Quantum Error-Correcting Codes by Concatenation QEC11
    Quantum Error-Correcting Codes by Concatenation QEC11 Second International Conference on Quantum Error Correction University of Southern California, Los Angeles, USA December 5–9, 2011 Quantum Error-Correcting Codes by Concatenation Markus Grassl joint work with Bei Zeng Centre for Quantum Technologies National University of Singapore Singapore Markus Grassl – 1– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 Why Bei isn’t here Jonathan, November 24, 2011 Markus Grassl – 2– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 Overview Shor’s nine-qubit code revisited • The code [[25, 1, 9]] • Concatenated graph codes • Generalized concatenated quantum codes • Codes for the Amplitude Damping (AD) channel • Conclusions • Markus Grassl – 3– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 Shor’s Nine-Qubit Code Revisited Bit-flip code: 0 000 , 1 111 . | → | | → | Phase-flip code: 0 + ++ , 1 . | → | | → | − −− Effect of single-qubit errors on the bit-flip code: X-errors change the basis states, but can be corrected • Z-errors at any of the three positions: • Z 000 = 000 | | “encoded” Z-operator Z 111 = 111 | −| = Bit-flip code & error correction convert the channel into a phase-error ⇒ channel = Concatenation of bit-flip code and phase-flip code yields [[9, 1, 3]] ⇒ Markus Grassl – 4– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 The Code [[25, 1, 9]] The best single-error correcting code is = [[5, 1, 3]] • C0 Re-encoding each of the 5 qubits with yields = [[52, 1, 32]]
    [Show full text]
  • Booklet of Abstracts
    Booklet of abstracts Thomas Vidick California Institute of Technology Tsirelson's problem and MIP*=RE Boris Tsirelson in 1993 implicitly posed "Tsirelson's Problem", a question about the possible equivalence between two different ways of modeling locality, and hence entanglement, in quantum mechanics. Tsirelson's Problem gained prominence through work of Fritz, Navascues et al., and Ozawa a decade ago that establishes its equivalence to the famous "Connes' Embedding Problem" in the theory of von Neumann algebras. Recently we gave a negative answer to Tsirelson's Problem and Connes' Embedding Problem by proving a seemingly stronger result in quantum complexity theory. This result is summarized in the equation MIP* = RE between two complexity classes. In the talk I will present and motivate Tsirelson's problem, and outline its connection to Connes' Embedding Problem. I will then explain the connection to quantum complexity theory and show how ideas developed in the past two decades in the study of classical and quantum interactive proof systems led to the characterization (which I will explain) MIP* = RE and the negative resolution of Tsirelson's Problem. Based on joint work with Ji, Natarajan, Wright and Yuen available at arXiv:2001.04383. Joonho Lee, Dominic Berry, Craig Gidney, William Huggins, Jarrod McClean, Nathan Wiebe and Ryan Babbush Columbia University | Macquarie University | Google | Google Research | Google | University of Washington | Google Efficient quantum computation of chemistry through tensor hypercontraction We show how to achieve the highest efficiency yet for simulations with arbitrary basis sets by using a representation of the Coulomb operator known as tensor hypercontraction (THC). We use THC to express the Coulomb operator in a non-orthogonal basis, which we are able to block encode by separately rotating each term with angles that are obtained via QROM.
    [Show full text]
  • Lecture 6: Quantum Error Correction and Quantum Capacity
    Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde∗ The quantum capacity theorem is one of the most important theorems in quantum Shannon theory. It is a fundamentally \quantum" theorem in that it demonstrates that a fundamentally quantum information quantity, the coherent information, is an achievable rate for quantum com- munication over a quantum channel. The fact that the coherent information does not have a strong analog in classical Shannon theory truly separates the quantum and classical theories of information. The no-cloning theorem provides the intuition behind quantum error correction. The goal of any quantum communication protocol is for Alice to establish quantum correlations with the receiver Bob. We know well now that every quantum channel has an isometric extension, so that we can think of another receiver, the environment Eve, who is at a second output port of a larger unitary evolution. Were Eve able to learn anything about the quantum information that Alice is attempting to transmit to Bob, then Bob could not be retrieving this information|otherwise, they would violate the no-cloning theorem. Thus, Alice should figure out some subspace of the channel input where she can place her quantum information such that only Bob has access to it, while Eve does not. That the dimensionality of this subspace is exponential in the coherent information is perhaps then unsurprising in light of the above no-cloning reasoning. The coherent information is an entropy difference H(B) − H(E)|a measure of the amount of quantum correlations that Alice can establish with Bob less the amount that Eve can gain.
    [Show full text]
  • Quantum Key Distribution Protocols and Applications
    Quantum Key Distribution Protocols and Applications Sheila Cobourne Technical Report RHUL{MA{2011{05 8th March 2011 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Title: Quantum Key Distribution – Protocols and Applications Name: Sheila Cobourne Student Number: 100627811 Supervisor: Carlos Cid Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature: Date: Acknowledgements I would like to thank Carlos Cid for his helpful suggestions and guidance during this project. Also, I would like to express my appreciation to the lecturers at Royal Holloway who have increased my understanding of Information Security immensely over the course of the MSc, without which this project would not have been possible. Contents Table of Figures ................................................................................................... 6 Executive Summary ............................................................................................. 7 Chapter 1 Introduction ...................................................................................
    [Show full text]
  • Reliably Distinguishing States in Qutrit Channels Using One-Way LOCC
    Reliably distinguishing states in qutrit channels using one-way LOCC Christopher King Department of Mathematics, Northeastern University, Boston MA 02115 Daniel Matysiak College of Computer and Information Science, Northeastern University, Boston MA 02115 July 15, 2018 Abstract We present numerical evidence showing that any three-dimensional subspace of C3 ⊗ Cn has an orthonormal basis which can be reliably dis- tinguished using one-way LOCC, where a measurement is made first on the 3-dimensional part and the result used to select an optimal measure- ment on the n-dimensional part. This conjecture has implications for the LOCC-assisted capacity of certain quantum channels, where coordinated measurements are made on the system and environment. By measuring first in the environment, the conjecture would imply that the environment- arXiv:quant-ph/0510004v1 1 Oct 2005 assisted classical capacity of any rank three channel is at least log 3. Sim- ilarly by measuring first on the system side, the conjecture would imply that the environment-assisting classical capacity of any qutrit channel is log 3. We also show that one-way LOCC is not symmetric, by providing an example of a qutrit channel whose environment-assisted classical capacity is less than log 3. 1 1 Introduction and statement of results The noise in a quantum channel arises from its interaction with the environment. This viewpoint is expressed concisely in the Lindblad-Stinespring representation [6, 8]: Φ(|ψihψ|)= Tr U(|ψihψ|⊗|ǫihǫ|)U ∗ (1) E Here E is the state space of the environment, which is assumed to be initially prepared in a pure state |ǫi.
    [Show full text]