symmetric incoherent eavesdropping against mdi qkdmatthew/talks/thursday/morning/wcc... ·...

93
Symmetric Incoherent Eavesdropping against MDI QKD Arpita Maitra 1 and Goutam Paul 2 1 Indian Statistical Institute, Kolkata, India 2 Jadavpur University, Kolkata, India WCC 2013, Bergen, Norway April 18, 2013

Upload: others

Post on 20-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Symmetric Incoherent Eavesdroppingagainst MDI QKD

Arpita Maitra1 and Goutam Paul2

1Indian Statistical Institute, Kolkata, India2Jadavpur University, Kolkata, India

WCC 2013, Bergen, NorwayApril 18, 2013

Page 2: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 3: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 4: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 5: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 6: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 7: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 8: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Outline

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 9: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 10: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Quantum Algebra for a Single Particle

The state |ψ〉 of a single particle is a normalized complex

vector

(αβ

)in two dimensions.

A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.

Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.

The basis{(1

0

),

(01

)}is called the computational basis

and is represented by {|0〉, |1〉}.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36

Page 11: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Quantum Algebra for a Single Particle

The state |ψ〉 of a single particle is a normalized complex

vector

(αβ

)in two dimensions.

A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.

Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.

The basis{(1

0

),

(01

)}is called the computational basis

and is represented by {|0〉, |1〉}.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36

Page 12: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Quantum Algebra for a Single Particle

The state |ψ〉 of a single particle is a normalized complex

vector

(αβ

)in two dimensions.

A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.

Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.

The basis{(1

0

),

(01

)}is called the computational basis

and is represented by {|0〉, |1〉}.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36

Page 13: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Quantum Algebra for a Single Particle

The state |ψ〉 of a single particle is a normalized complex

vector

(αβ

)in two dimensions.

A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.

Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.

The basis{(1

0

),

(01

)}is called the computational basis

and is represented by {|0〉, |1〉}.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36

Page 14: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Quantum Algebra for a Single Particle

The state |ψ〉 of a single particle is a normalized complex

vector

(αβ

)in two dimensions.

A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.

Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.

The basis{(1

0

),

(01

)}is called the computational basis

and is represented by {|0〉, |1〉}.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36

Page 15: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

From One to Many Particles

For two particles in states (α1|0〉+ β1|1〉) and(α2|0〉+ β2|1〉), the joint state is given by the tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉)= α1α2|00〉+ α1β2|01〉+ β1α2|10〉+ β1β2|11〉,which is a complex vector in 4 dimensions.

In general, the state for n particles is a complex vector in2n-dimensional complex vector space (called a Hilbert Space).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 4 of 36

Page 16: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

From One to Many Particles

For two particles in states (α1|0〉+ β1|1〉) and(α2|0〉+ β2|1〉), the joint state is given by the tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉)= α1α2|00〉+ α1β2|01〉+ β1α2|10〉+ β1β2|11〉,which is a complex vector in 4 dimensions.

In general, the state for n particles is a complex vector in2n-dimensional complex vector space (called a Hilbert Space).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 4 of 36

Page 17: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

From One to Many Particles

For two particles in states (α1|0〉+ β1|1〉) and(α2|0〉+ β2|1〉), the joint state is given by the tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉)= α1α2|00〉+ α1β2|01〉+ β1α2|10〉+ β1β2|11〉,which is a complex vector in 4 dimensions.

In general, the state for n particles is a complex vector in2n-dimensional complex vector space (called a Hilbert Space).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 4 of 36

Page 18: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Conjugate Bases

Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.

The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1

N for any i , j .

For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36

Page 19: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Conjugate Bases

Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.

The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1

N for any i , j .

For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36

Page 20: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Conjugate Bases

Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.

The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1

N for any i , j .

For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36

Page 21: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Conjugate Bases

Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.

The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1

N for any i , j .

For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36

Page 22: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Entanglement

Consider the stateγ1|00〉+ γ2|11〉

with γ1 6= 0, γ2 6= 0.

This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).

This is called entanglement. An example of entangled state is

|00〉+ |11〉√2

.

Physical meaning: knowledge of the state of one particlereveals the state of the other.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36

Page 23: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Entanglement

Consider the stateγ1|00〉+ γ2|11〉

with γ1 6= 0, γ2 6= 0.

This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).

This is called entanglement. An example of entangled state is

|00〉+ |11〉√2

.

Physical meaning: knowledge of the state of one particlereveals the state of the other.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36

Page 24: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Entanglement

Consider the stateγ1|00〉+ γ2|11〉

with γ1 6= 0, γ2 6= 0.

This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).

This is called entanglement. An example of entangled state is

|00〉+ |11〉√2

.

Physical meaning: knowledge of the state of one particlereveals the state of the other.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36

Page 25: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Entanglement

Consider the stateγ1|00〉+ γ2|11〉

with γ1 6= 0, γ2 6= 0.

This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).

This is called entanglement. An example of entangled state is

|00〉+ |11〉√2

.

Physical meaning: knowledge of the state of one particlereveals the state of the other.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36

Page 26: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Entanglement

Consider the stateγ1|00〉+ γ2|11〉

with γ1 6= 0, γ2 6= 0.

This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).

This is called entanglement. An example of entangled state is

|00〉+ |11〉√2

.

Physical meaning: knowledge of the state of one particlereveals the state of the other.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36

Page 27: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 28: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 Protocol

C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).

Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.

Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36

Page 29: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 Protocol

C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).

Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.

Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36

Page 30: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 Protocol

C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).

Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.

Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36

Page 31: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 Protocol

C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).

Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.

Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36

Page 32: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

A Pictorial Description

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 8 of 36

Page 33: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend

No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.

Eve has to measure the photons sent by Alice before sendingthem on to Bob.

Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36

Page 34: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend

No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.

Eve has to measure the photons sent by Alice before sendingthem on to Bob.

Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36

Page 35: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend

No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.

Eve has to measure the photons sent by Alice before sendingthem on to Bob.

Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36

Page 36: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend

No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.

Eve has to measure the photons sent by Alice before sendingthem on to Bob.

Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36

Page 37: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend (contd ...)

If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.

Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.

If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36

Page 38: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend (contd ...)

If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.

Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.

If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36

Page 39: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend (contd ...)

If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.

Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.

If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36

Page 40: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Basic Eavesdropping: Measure and Resend (contd ...)

If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.

Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.

If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36

Page 41: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 in Practice

Alice sends 4n + δ photons to Bob.

After discarding the photons with disagreeing bases, roughly2n bits are left.

Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.

If the number of disagreement is more than an acceptablelimit then the protocol is aborted.

Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36

Page 42: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 in Practice

Alice sends 4n + δ photons to Bob.

After discarding the photons with disagreeing bases, roughly2n bits are left.

Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.

If the number of disagreement is more than an acceptablelimit then the protocol is aborted.

Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36

Page 43: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 in Practice

Alice sends 4n + δ photons to Bob.

After discarding the photons with disagreeing bases, roughly2n bits are left.

Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.

If the number of disagreement is more than an acceptablelimit then the protocol is aborted.

Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36

Page 44: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 in Practice

Alice sends 4n + δ photons to Bob.

After discarding the photons with disagreeing bases, roughly2n bits are left.

Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.

If the number of disagreement is more than an acceptablelimit then the protocol is aborted.

Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36

Page 45: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 in Practice

Alice sends 4n + δ photons to Bob.

After discarding the photons with disagreeing bases, roughly2n bits are left.

Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.

If the number of disagreement is more than an acceptablelimit then the protocol is aborted.

Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36

Page 46: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

BB84 in Practice

Alice sends 4n + δ photons to Bob.

After discarding the photons with disagreeing bases, roughly2n bits are left.

Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.

If the number of disagreement is more than an acceptablelimit then the protocol is aborted.

Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36

Page 47: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Two Sources of Security in BB84

The quantum channel, where any measurement introduceserror (qubits cannot be copied).Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.

Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36

Page 48: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Two Sources of Security in BB84

The quantum channel, where any measurement introduceserror (qubits cannot be copied).

Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.

Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36

Page 49: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Two Sources of Security in BB84

The quantum channel, where any measurement introduceserror (qubits cannot be copied).Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.

Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36

Page 50: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

The ProtocolSecurity Issues

Two Sources of Security in BB84

The quantum channel, where any measurement introduceserror (qubits cannot be copied).Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.

Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36

Page 51: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 52: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Idea

Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).

The idea is to resist detector side channel attacks.

All the measurements are executed at Eve’s end, an untrustedthird-party.

It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36

Page 53: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Idea

Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).

The idea is to resist detector side channel attacks.

All the measurements are executed at Eve’s end, an untrustedthird-party.

It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36

Page 54: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Idea

Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).

The idea is to resist detector side channel attacks.

All the measurements are executed at Eve’s end, an untrustedthird-party.

It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36

Page 55: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Idea

Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).

The idea is to resist detector side channel attacks.

All the measurements are executed at Eve’s end, an untrustedthird-party.

It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36

Page 56: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Basic Idea

Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).

The idea is to resist detector side channel attacks.

All the measurements are executed at Eve’s end, an untrustedthird-party.

It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36

Page 57: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Bell States

The MDI QKD algorithm uses Bell states.

These are two-qubit entangled states.

Denoted by |Φ±〉 = 1√2

[|00〉 ± |11〉], |Ψ±〉 = 1√2

[|01〉 ± |10〉].They form an orthogonal basis in a four-dimensional Hilbertspace.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 14 of 36

Page 58: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Description of MDI QKD

Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.

Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.

Alice and Bob announces the bases and discards themismatched ones.

For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.

Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36

Page 59: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Description of MDI QKD

Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.

Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.

Alice and Bob announces the bases and discards themismatched ones.

For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.

Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36

Page 60: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Description of MDI QKD

Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.

Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.

Alice and Bob announces the bases and discards themismatched ones.

For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.

Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36

Page 61: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Description of MDI QKD

Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.

Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.

Alice and Bob announces the bases and discards themismatched ones.

For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.

Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36

Page 62: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Description of MDI QKD

Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.

Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.

Alice and Bob announces the bases and discards themismatched ones.

For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.

Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36

Page 63: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Description of MDI QKD

Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.

Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.

Alice and Bob announces the bases and discards themismatched ones.

For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.

Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36

Page 64: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Different Cases

Qubits sent by Probability (Eve’s end) Flip

Alice Bob |Φ+〉 |Φ−〉 |Ψ+〉 |Ψ−〉|0〉 |0〉 1

212 0 0 No

|0〉 |1〉 0 0 12

12 Yes

|1〉 |0〉 0 0 12

12 Yes

|1〉 |1〉 12

12 0 0 No

|+〉 |+〉 12 0 1

2 0 No|+〉 |−〉 0 1

2 0 12 Yes

|−〉 |+〉 0 12 0 1

2 Yes|−〉 |−〉 1

2 0 12 0 No

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 16 of 36

Page 65: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 66: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

Eavesdropping: Different Models

Will Eve work on each individual qubit or a set of qubitstogether?

the first one is called the incoherent attack,the second one is known as coherent attack.

Will there be equal error probability at Bob’s endcorresponding to different bases?

If this is indeed equal, then we call it symmetric.Otherwise, we call it asymmetric.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 17 of 36

Page 67: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

How does Eve interact?

U

From Alice |µ〉

At Eve |W 〉 |W ′〉 At Eve

|µ′〉 To Bob

} may be entangled

Figure: The model of Eavesdropping

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 18 of 36

Page 68: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

The unitary interactions at Eve’s end

U|0〉|W 〉 =√

1− D|0〉|E00〉+√

D|1〉|E01〉,U|1〉|W 〉 =

√1− D|1〉|E11〉+

√D|0〉|E10〉,

where D is the disturbance and 1− D is the fidelity and Epq is thestate of Eve’s ancilla qubits after the interaction.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 19 of 36

Page 69: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

Expressions for Eve’s post-interaction states

|E00〉 =√

1− D|00〉+ |11〉√

2+√

D|00〉 − |11〉√

2,

|E01〉 =√

1− D|01〉+ |10〉√

2−√

D|01〉 − |10〉√

2,

|E10〉 =√

1− D|01〉+ |10〉√

2+√

D|01〉 − |10〉√

2,

|E11〉 =√

1− D|00〉+ |11〉√

2−√

D|00〉 − |11〉√

2.

It can be shown that Eve can correctly guess the qubit sent byAlice and received by Bob with probability 1

2 +√

D(1− D).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 20 of 36

Page 70: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

The unitary interactions at Eve’s end

U|0〉A|W 〉A =√

1− D|0〉A|E00〉A +√

D|1〉A|E01〉A,U|1〉A|W 〉A =

√1− D|1〉A|E11〉A +

√D|0〉A|E10〉A,

where D is the disturbance and 1− D is the fidelity and Epq is thestate of Eve’s ancilla qubits after the interaction.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 21 of 36

Page 71: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

The overall state at Eve’s end

An example case: both Alice and Bob send 0.

(√

1− D|0〉A|E00〉A +√

D|1〉A|E01〉A)|0〉B

=

√1− D

2|E00〉A|φ+〉AB +

√1− D

2|E00〉A|φ−〉AB

+

√D

2|E01〉A|ψ+〉AB −

√D

2|E01〉A|ψ−〉AB .

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 22 of 36

Page 72: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

The unitary interactions at Eve’s end

U|0〉A|W 〉A =√

1− D|0〉A|E00〉A +√

D|1〉A|E01〉A,U|1〉A|W 〉A =

√1− D|1〉A|E11〉A +

√D|0〉A|E10〉A,

U|0〉B |W 〉B =√

1− D|0〉B |E00〉B +√

D|1〉B |E01〉B ,U|1〉B |W 〉B =

√1− D|1〉B |E11〉B +

√D|0〉B |E10〉B .

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 23 of 36

Page 73: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

The overall state at Eve’s end

An example case: when Alice sends 0 and Bob sends 1.(1− D√

2|F0011〉+

D√2|F0110〉

)Ψ+

AB +

(1− D√

2|F0011〉 −

D√2|F0110〉

)Ψ−AB

+

(√D(1− D)

2|F0111〉+

√D(1− D)

2|F0010〉

)Φ+AB

+

(√D(1− D)

2|F0010〉 −

√D(1− D)

2|F0111〉

)Φ−AB .

Here, |Fpqrs〉 = |Epq〉A|Ers〉B .

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 24 of 36

Page 74: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

For BB84For MDI QKD on one sideFor MDI QKD on both sides

The effective disturbance at Alice and Bob’s end

Proposition

When Eve eavesdrops on both the sides, the effective disturbanceat Alice and Bob’s end is given by ∆(D) = 2D(1− D).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 25 of 36

Page 75: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 76: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

One-sided EavesdroppingTwo-sided Eavesdropping

Eve’s Likelihoods P(V = v | A = a,B = b)

VA = 0, A = 0, A = 1, A = 1,B = 0 B = 1 B = 0 B = 1

00 (1− D)d (1− D)d (1− D)d ′ (1− D)d ′

01 Dd ′ Dd ′ Dd Dd

10 Dd Dd Dd ′ Dd ′

11 (1− D)d ′ (1− D)d ′ (1− D)d (1− D)d

Here d = 12 +

√D(1− D) and d ′ = 1

2 −√

D(1− D).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 26 of 36

Page 77: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

One-sided EavesdroppingTwo-sided Eavesdropping

Success Probability Expressions

Theorem

The optimal success probability of Eve in guessing the bit sent byAlice is given by 1

2 +√

D(1− D).

Corollary

Success probability for guessing both Alice’s and Bob’s bit isP1(D) = 1

2 d = 14 + 1

2

√D(1− D).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 27 of 36

Page 78: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

One-sided EavesdroppingTwo-sided Eavesdropping

Eve’s Likelihoods P(V = v | A = a,B = b)

V A = 0,B = 0 A = 0,B = 1 A = 1,B = 0 A = 1,B = 10000 1

4 (1− D)2d+14 (1− D)2d2

14 (1− D)2d2

14 (1− D)2d−

0001 14 D(1− D)d2

14 D(1− D)d+

14 D(1− D)d−

14 D(1− D)d2

0010 14 D(1− D)d+

14 D(1− D)d2

14 D(1− D)d2

14 D(1− D)d−

0011 14 (1− D)2d2

14 (1− D)2d+

14 (1− D)2d−

14 (1− D)2d2

· · · · · · · · · · · · · · ·1100 1

4 (1− D)2d214 (1− D)2d−

14 (1− D)2d+

14 (1− D)2d2

1101 14 D(1− D)d−

14 D(1− D)d2

14 D(1− D)d2

14 D(1− D)d+

1110 14 D(1− D)d2

14 D(1− D)d−

14 D(1− D)d+

14 D(1− D)d2

1111 14 (1− D)2d−

14 (1− D)2d2

14 (1− D)2d2

14 (1− D)2d+

Here d± = (√

1− D ±√

D)4 and d2 = (1− 2D)2.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 28 of 36

Page 79: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

One-sided EavesdroppingTwo-sided Eavesdropping

Success Probability Expressions

Theorem

The optimal success probability of Eve in guessing a pair of bitssent by Alice and Bob is given byP2(D) = 1

4 + D(1− D) +√

D(1− D).

Corollary

Introducing a disturbance ∆, the optimal success probability of Evein guessing a pair of bits sent by Alice and Bob is given by14 + ∆

2 +√

∆2 .

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 29 of 36

Page 80: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

One-sided EavesdroppingTwo-sided Eavesdropping

Eve’s optimal guesses corresponding to her measurementoutcomes

V 0000 0001 0010 0011 0100 0101 0110 0111GA,GB 0, 0 0, 1 0, 0 0, 1 1, 0 1, 1 1, 0 1, 1

V 1000 1001 1010 1011 1100 1101 1110 1111

GA,GB 0, 0 0, 1 0, 0 0, 1 1, 0 1, 1 1, 0 1, 1

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 30 of 36

Page 81: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 82: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Error Location in BB84

If Alice sends |0〉, then Eve will obtain either |E00〉 or |E01〉.Eve now measures in {|00〉, |01〉, |10〉, |11〉} basis.

If Eve observes |00〉 or |11〉, then she knows that Bobobtained |0〉, i.e., no error has been introduced.

If Eve observes |01〉 or |10〉, then she knows that Bobobtained |1〉, i.e., error has been introduced.

Thus, in BB84 protocol, Eve can decide with certaintywhether her interaction has introduced an error or not.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 31 of 36

Page 83: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Error Location: One-sided Eavesdropping

In this case Alice and Bob produce the bits independently.

So, looking at Alice’s bit, it is not possible to know whathappens in case of Bob’s bit.

Thus, Alice has no advantage.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 32 of 36

Page 84: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Error Location: Two-sided Eavesdropping

A B GA GB P(A,B,GA,GB)Error Guessed

by Eve correctly

0 0

0 0 116 d+ Y

0 1 116 d2 N

1 0 116 d2 N

1 1 116 d− Y

0 1

0 0 116 d2 N

0 1 116 d+ Y

1 0 116 d− Y

1 1 116 d2 N

Similarly, AB = 10 and 11 can also be analyzed.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 33 of 36

Page 85: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

Probability of Eve’s Guessing the Error Location

Theorem

Eve can guess whether an error has been introduced between Aliceand Bob or not with probability 1

2 + 2D(1− D).

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 34 of 36

Page 86: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Roadmap

1 Review of Quantum Information

2 Key Distribution using BB84The ProtocolSecurity Issues

3 MDI QKD

4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides

5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping

6 Guessing the Location of Errors

7 ConclusionSummaryFuture Work

Page 87: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Summary

We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.

It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.

Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.

The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.

In terms of location of errors, MDI-QKD leaks lessinformation than BB84.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36

Page 88: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Summary

We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.

It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.

Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.

The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.

In terms of location of errors, MDI-QKD leaks lessinformation than BB84.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36

Page 89: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Summary

We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.

It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.

Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.

The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.

In terms of location of errors, MDI-QKD leaks lessinformation than BB84.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36

Page 90: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Summary

We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.

It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.

Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.

The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.

In terms of location of errors, MDI-QKD leaks lessinformation than BB84.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36

Page 91: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Summary

We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.

It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.

Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.

The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.

In terms of location of errors, MDI-QKD leaks lessinformation than BB84.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36

Page 92: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Summary

We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.

It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.

Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.

The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.

In terms of location of errors, MDI-QKD leaks lessinformation than BB84.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36

Page 93: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle

Review of Quantum InformationKey Distribution using BB84

MDI QKDAttack Model

Eve’s Success ProbabilitiesGuessing the Location of Errors

Conclusion

SummaryFuture Work

Future Work

To analyze different “device independent” protocols undersimilar attack models.

To investigate countermeasures against this type of attacks.

Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 36 of 36