symmetric incoherent eavesdropping against mdi qkdmatthew/talks/thursday/morning/wcc... ·...
TRANSCRIPT
![Page 1: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/1.jpg)
Symmetric Incoherent Eavesdroppingagainst MDI QKD
Arpita Maitra1 and Goutam Paul2
1Indian Statistical Institute, Kolkata, India2Jadavpur University, Kolkata, India
WCC 2013, Bergen, NorwayApril 18, 2013
![Page 2: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/2.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 3: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/3.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 4: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/4.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 5: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/5.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 6: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/6.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 7: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/7.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 8: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/8.jpg)
Outline
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 9: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/9.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 10: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/10.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Quantum Algebra for a Single Particle
The state |ψ〉 of a single particle is a normalized complex
vector
(αβ
)in two dimensions.
A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.
Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.
The basis{(1
0
),
(01
)}is called the computational basis
and is represented by {|0〉, |1〉}.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36
![Page 11: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/11.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Quantum Algebra for a Single Particle
The state |ψ〉 of a single particle is a normalized complex
vector
(αβ
)in two dimensions.
A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.
Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.
The basis{(1
0
),
(01
)}is called the computational basis
and is represented by {|0〉, |1〉}.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36
![Page 12: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/12.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Quantum Algebra for a Single Particle
The state |ψ〉 of a single particle is a normalized complex
vector
(αβ
)in two dimensions.
A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.
Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.
The basis{(1
0
),
(01
)}is called the computational basis
and is represented by {|0〉, |1〉}.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36
![Page 13: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/13.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Quantum Algebra for a Single Particle
The state |ψ〉 of a single particle is a normalized complex
vector
(αβ
)in two dimensions.
A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.
Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.
The basis{(1
0
),
(01
)}is called the computational basis
and is represented by {|0〉, |1〉}.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36
![Page 14: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/14.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Quantum Algebra for a Single Particle
The state |ψ〉 of a single particle is a normalized complex
vector
(αβ
)in two dimensions.
A standard measurement is an orthonormal basis {|m1〉, |m2〉}of two dimensional complex vectors. If the initial state is |ψ〉,then after the measurement, the probability of the outcome|mi 〉 is |〈ψ|mi 〉|2.
Every allowed reversible physical transformation on the stateof a particle is represented by a 2× 2 unitary matrix U.
The basis{(1
0
),
(01
)}is called the computational basis
and is represented by {|0〉, |1〉}.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 3 of 36
![Page 15: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/15.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
From One to Many Particles
For two particles in states (α1|0〉+ β1|1〉) and(α2|0〉+ β2|1〉), the joint state is given by the tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉)= α1α2|00〉+ α1β2|01〉+ β1α2|10〉+ β1β2|11〉,which is a complex vector in 4 dimensions.
In general, the state for n particles is a complex vector in2n-dimensional complex vector space (called a Hilbert Space).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 4 of 36
![Page 16: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/16.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
From One to Many Particles
For two particles in states (α1|0〉+ β1|1〉) and(α2|0〉+ β2|1〉), the joint state is given by the tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉)= α1α2|00〉+ α1β2|01〉+ β1α2|10〉+ β1β2|11〉,which is a complex vector in 4 dimensions.
In general, the state for n particles is a complex vector in2n-dimensional complex vector space (called a Hilbert Space).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 4 of 36
![Page 17: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/17.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
From One to Many Particles
For two particles in states (α1|0〉+ β1|1〉) and(α2|0〉+ β2|1〉), the joint state is given by the tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉)= α1α2|00〉+ α1β2|01〉+ β1α2|10〉+ β1β2|11〉,which is a complex vector in 4 dimensions.
In general, the state for n particles is a complex vector in2n-dimensional complex vector space (called a Hilbert Space).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 4 of 36
![Page 18: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/18.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Conjugate Bases
Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.
The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1
N for any i , j .
For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36
![Page 19: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/19.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Conjugate Bases
Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.
The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1
N for any i , j .
For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36
![Page 20: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/20.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Conjugate Bases
Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.
The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1
N for any i , j .
For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36
![Page 21: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/21.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Conjugate Bases
Suppose, {|ψi 〉 : i = 1, . . . ,N} and {|φi 〉 : i = 1, . . . ,N} aretwo orthonormal bases for an N dimensional Hilbert space.
The above pair of bases are called conjugate, if and only if|〈ψi |φj〉|2 = 1
N for any i , j .
For N = 2, the bases {|ψ1〉, |ψ2〉} and {|φ1〉, |φ2〉} areconjugate, if and only if we have|〈ψ1|φ1〉|2 = |〈ψ1|φ2〉|2 = |〈ψ2|φ1〉|2 = |〈ψ2|φ2〉|2= 1/2.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 5 of 36
![Page 22: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/22.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Entanglement
Consider the stateγ1|00〉+ γ2|11〉
with γ1 6= 0, γ2 6= 0.
This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).
This is called entanglement. An example of entangled state is
|00〉+ |11〉√2
.
Physical meaning: knowledge of the state of one particlereveals the state of the other.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36
![Page 23: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/23.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Entanglement
Consider the stateγ1|00〉+ γ2|11〉
with γ1 6= 0, γ2 6= 0.
This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).
This is called entanglement. An example of entangled state is
|00〉+ |11〉√2
.
Physical meaning: knowledge of the state of one particlereveals the state of the other.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36
![Page 24: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/24.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Entanglement
Consider the stateγ1|00〉+ γ2|11〉
with γ1 6= 0, γ2 6= 0.
This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).
This is called entanglement. An example of entangled state is
|00〉+ |11〉√2
.
Physical meaning: knowledge of the state of one particlereveals the state of the other.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36
![Page 25: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/25.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Entanglement
Consider the stateγ1|00〉+ γ2|11〉
with γ1 6= 0, γ2 6= 0.
This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).
This is called entanglement. An example of entangled state is
|00〉+ |11〉√2
.
Physical meaning: knowledge of the state of one particlereveals the state of the other.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36
![Page 26: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/26.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Entanglement
Consider the stateγ1|00〉+ γ2|11〉
with γ1 6= 0, γ2 6= 0.
This cannot be written as a tensor product(α1|0〉+ β1|1〉)⊗ (α2|0〉+ β2|1〉).
This is called entanglement. An example of entangled state is
|00〉+ |11〉√2
.
Physical meaning: knowledge of the state of one particlereveals the state of the other.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 6 of 36
![Page 27: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/27.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 28: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/28.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 Protocol
C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).
Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.
Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36
![Page 29: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/29.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 Protocol
C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).
Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.
Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36
![Page 30: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/30.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 Protocol
C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).
Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.
Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36
![Page 31: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/31.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 Protocol
C. H. Bennett and G. Brassard.Quantum Cryptography: Public key distribution and cointossing.In Proceedings of the IEEE International Conference onComputers, Systems, and Signal Processing, Bangalore, India,175–179, IEEE, New York (1984).
Uses two conjugate bases + = {↑,→} and × = {↗,↖} toestablish a secret key between two parties at a distance.
Suppose they fix the convention that the first vector in eachbasis represents 0 and the second vector in each basisrepresents 1.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 7 of 36
![Page 32: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/32.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
A Pictorial Description
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 8 of 36
![Page 33: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/33.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend
No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.
Eve has to measure the photons sent by Alice before sendingthem on to Bob.
Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36
![Page 34: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/34.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend
No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.
Eve has to measure the photons sent by Alice before sendingthem on to Bob.
Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36
![Page 35: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/35.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend
No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.
Eve has to measure the photons sent by Alice before sendingthem on to Bob.
Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36
![Page 36: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/36.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend
No cloning theorem (Wooters & Zurek, Nature 299, 1982)assures that Eve cannot replicate a particle of unknown state.
Eve has to measure the photons sent by Alice before sendingthem on to Bob.
Since Eve will not know what bases Alice used to encoded thebit until after Alice and Bob discuss their measurements, Evewill be forced to guess the basis randomly.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 9 of 36
![Page 37: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/37.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend (contd ...)
If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.
Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.
If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36
![Page 38: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/38.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend (contd ...)
If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.
Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.
If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36
![Page 39: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/39.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend (contd ...)
If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.
Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.
If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36
![Page 40: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/40.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Basic Eavesdropping: Measure and Resend (contd ...)
If she measures on the incorrect bases, Bob will read a bitincorrectly 50% of the time.
Given that Eve will choose the measurement basis incorrectlyon average 50% of the time, 25% of Bob’s measured bits willdiffer from Alice.
If Eve has eavesdropped on all the bits, then after n bitcomparisons by Alice and Bob, they will reduce the probabilitythat Eve will go undetected to 0.75n.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 10 of 36
![Page 41: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/41.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 in Practice
Alice sends 4n + δ photons to Bob.
After discarding the photons with disagreeing bases, roughly2n bits are left.
Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.
If the number of disagreement is more than an acceptablelimit then the protocol is aborted.
Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36
![Page 42: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/42.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 in Practice
Alice sends 4n + δ photons to Bob.
After discarding the photons with disagreeing bases, roughly2n bits are left.
Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.
If the number of disagreement is more than an acceptablelimit then the protocol is aborted.
Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36
![Page 43: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/43.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 in Practice
Alice sends 4n + δ photons to Bob.
After discarding the photons with disagreeing bases, roughly2n bits are left.
Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.
If the number of disagreement is more than an acceptablelimit then the protocol is aborted.
Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36
![Page 44: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/44.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 in Practice
Alice sends 4n + δ photons to Bob.
After discarding the photons with disagreeing bases, roughly2n bits are left.
Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.
If the number of disagreement is more than an acceptablelimit then the protocol is aborted.
Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36
![Page 45: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/45.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 in Practice
Alice sends 4n + δ photons to Bob.
After discarding the photons with disagreeing bases, roughly2n bits are left.
Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.
If the number of disagreement is more than an acceptablelimit then the protocol is aborted.
Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36
![Page 46: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/46.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
BB84 in Practice
Alice sends 4n + δ photons to Bob.
After discarding the photons with disagreeing bases, roughly2n bits are left.
Alice selects a subset of n qubits to serve as check bits againstthe noise and interference of any possible eavesdropper Eve.
If the number of disagreement is more than an acceptablelimit then the protocol is aborted.
Information reconciliation and privacy amplification areperformed by Alice and Bob on the remaining n bits to obtainm shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 11 of 36
![Page 47: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/47.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Two Sources of Security in BB84
The quantum channel, where any measurement introduceserror (qubits cannot be copied).Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.
Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36
![Page 48: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/48.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Two Sources of Security in BB84
The quantum channel, where any measurement introduceserror (qubits cannot be copied).
Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.
Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36
![Page 49: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/49.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Two Sources of Security in BB84
The quantum channel, where any measurement introduceserror (qubits cannot be copied).Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.
Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36
![Page 50: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/50.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
The ProtocolSecurity Issues
Two Sources of Security in BB84
The quantum channel, where any measurement introduceserror (qubits cannot be copied).Note: because of no-cloning, quantum channel is a perfectlysecure communication channel from classical point of view.
Orthogonal basis to represent 0 and 1 (non-orthogonal statescannot be distinguished).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 12 of 36
![Page 51: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/51.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 52: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/52.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Idea
Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).
The idea is to resist detector side channel attacks.
All the measurements are executed at Eve’s end, an untrustedthird-party.
It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36
![Page 53: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/53.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Idea
Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).
The idea is to resist detector side channel attacks.
All the measurements are executed at Eve’s end, an untrustedthird-party.
It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36
![Page 54: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/54.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Idea
Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).
The idea is to resist detector side channel attacks.
All the measurements are executed at Eve’s end, an untrustedthird-party.
It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36
![Page 55: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/55.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Idea
Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).
The idea is to resist detector side channel attacks.
All the measurements are executed at Eve’s end, an untrustedthird-party.
It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36
![Page 56: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/56.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Basic Idea
Measurement Device Independent (MDI) Quantum KeyDistribution (QKD) idea has been presented very recently byLo, Curty and Qi (PRL, 2012).
The idea is to resist detector side channel attacks.
All the measurements are executed at Eve’s end, an untrustedthird-party.
It is natural to consider that Eve herself will try to gatherinformation about the secret key while assisting Alice and Bob.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 13 of 36
![Page 57: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/57.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Bell States
The MDI QKD algorithm uses Bell states.
These are two-qubit entangled states.
Denoted by |Φ±〉 = 1√2
[|00〉 ± |11〉], |Ψ±〉 = 1√2
[|01〉 ± |10〉].They form an orthogonal basis in a four-dimensional Hilbertspace.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 14 of 36
![Page 58: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/58.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Description of MDI QKD
Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.
Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.
Alice and Bob announces the bases and discards themismatched ones.
For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.
Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36
![Page 59: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/59.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Description of MDI QKD
Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.
Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.
Alice and Bob announces the bases and discards themismatched ones.
For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.
Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36
![Page 60: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/60.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Description of MDI QKD
Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.
Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.
Alice and Bob announces the bases and discards themismatched ones.
For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.
Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36
![Page 61: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/61.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Description of MDI QKD
Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.
Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.
Alice and Bob announces the bases and discards themismatched ones.
For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.
Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36
![Page 62: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/62.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Description of MDI QKD
Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.
Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.
Alice and Bob announces the bases and discards themismatched ones.
For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.
Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36
![Page 63: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/63.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Description of MDI QKD
Alice and Bob send random bit strings to Eve after encodingthem in either Z or X basis randomly.
Eve measures each pair (one from Alice and one from Bob) inthe Bell basis and publicly announces the results.
Alice and Bob announces the bases and discards themismatched ones.
For the matched bases, one of Alice and Bob flips the bit, ifboth are in Z basis and Eve’s outcome are |Ψ±〉, ORboth are in X basis and Eve’s outcome are |Φ−〉 or |Ψ−〉.
Error estimation, information reconciliation and privacyamplification are performed by Alice and Bob on the bits attheir ends to obtain the final shared key bits.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 15 of 36
![Page 64: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/64.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Different Cases
Qubits sent by Probability (Eve’s end) Flip
Alice Bob |Φ+〉 |Φ−〉 |Ψ+〉 |Ψ−〉|0〉 |0〉 1
212 0 0 No
|0〉 |1〉 0 0 12
12 Yes
|1〉 |0〉 0 0 12
12 Yes
|1〉 |1〉 12
12 0 0 No
|+〉 |+〉 12 0 1
2 0 No|+〉 |−〉 0 1
2 0 12 Yes
|−〉 |+〉 0 12 0 1
2 Yes|−〉 |−〉 1
2 0 12 0 No
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 16 of 36
![Page 65: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/65.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 66: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/66.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
Eavesdropping: Different Models
Will Eve work on each individual qubit or a set of qubitstogether?
the first one is called the incoherent attack,the second one is known as coherent attack.
Will there be equal error probability at Bob’s endcorresponding to different bases?
If this is indeed equal, then we call it symmetric.Otherwise, we call it asymmetric.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 17 of 36
![Page 67: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/67.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
How does Eve interact?
U
From Alice |µ〉
At Eve |W 〉 |W ′〉 At Eve
|µ′〉 To Bob
} may be entangled
Figure: The model of Eavesdropping
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 18 of 36
![Page 68: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/68.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
The unitary interactions at Eve’s end
U|0〉|W 〉 =√
1− D|0〉|E00〉+√
D|1〉|E01〉,U|1〉|W 〉 =
√1− D|1〉|E11〉+
√D|0〉|E10〉,
where D is the disturbance and 1− D is the fidelity and Epq is thestate of Eve’s ancilla qubits after the interaction.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 19 of 36
![Page 69: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/69.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
Expressions for Eve’s post-interaction states
|E00〉 =√
1− D|00〉+ |11〉√
2+√
D|00〉 − |11〉√
2,
|E01〉 =√
1− D|01〉+ |10〉√
2−√
D|01〉 − |10〉√
2,
|E10〉 =√
1− D|01〉+ |10〉√
2+√
D|01〉 − |10〉√
2,
|E11〉 =√
1− D|00〉+ |11〉√
2−√
D|00〉 − |11〉√
2.
It can be shown that Eve can correctly guess the qubit sent byAlice and received by Bob with probability 1
2 +√
D(1− D).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 20 of 36
![Page 70: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/70.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
The unitary interactions at Eve’s end
U|0〉A|W 〉A =√
1− D|0〉A|E00〉A +√
D|1〉A|E01〉A,U|1〉A|W 〉A =
√1− D|1〉A|E11〉A +
√D|0〉A|E10〉A,
where D is the disturbance and 1− D is the fidelity and Epq is thestate of Eve’s ancilla qubits after the interaction.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 21 of 36
![Page 71: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/71.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
The overall state at Eve’s end
An example case: both Alice and Bob send 0.
(√
1− D|0〉A|E00〉A +√
D|1〉A|E01〉A)|0〉B
=
√1− D
2|E00〉A|φ+〉AB +
√1− D
2|E00〉A|φ−〉AB
+
√D
2|E01〉A|ψ+〉AB −
√D
2|E01〉A|ψ−〉AB .
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 22 of 36
![Page 72: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/72.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
The unitary interactions at Eve’s end
U|0〉A|W 〉A =√
1− D|0〉A|E00〉A +√
D|1〉A|E01〉A,U|1〉A|W 〉A =
√1− D|1〉A|E11〉A +
√D|0〉A|E10〉A,
U|0〉B |W 〉B =√
1− D|0〉B |E00〉B +√
D|1〉B |E01〉B ,U|1〉B |W 〉B =
√1− D|1〉B |E11〉B +
√D|0〉B |E10〉B .
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 23 of 36
![Page 73: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/73.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
The overall state at Eve’s end
An example case: when Alice sends 0 and Bob sends 1.(1− D√
2|F0011〉+
D√2|F0110〉
)Ψ+
AB +
(1− D√
2|F0011〉 −
D√2|F0110〉
)Ψ−AB
+
(√D(1− D)
2|F0111〉+
√D(1− D)
2|F0010〉
)Φ+AB
+
(√D(1− D)
2|F0010〉 −
√D(1− D)
2|F0111〉
)Φ−AB .
Here, |Fpqrs〉 = |Epq〉A|Ers〉B .
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 24 of 36
![Page 74: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/74.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
For BB84For MDI QKD on one sideFor MDI QKD on both sides
The effective disturbance at Alice and Bob’s end
Proposition
When Eve eavesdrops on both the sides, the effective disturbanceat Alice and Bob’s end is given by ∆(D) = 2D(1− D).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 25 of 36
![Page 75: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/75.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 76: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/76.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
One-sided EavesdroppingTwo-sided Eavesdropping
Eve’s Likelihoods P(V = v | A = a,B = b)
VA = 0, A = 0, A = 1, A = 1,B = 0 B = 1 B = 0 B = 1
00 (1− D)d (1− D)d (1− D)d ′ (1− D)d ′
01 Dd ′ Dd ′ Dd Dd
10 Dd Dd Dd ′ Dd ′
11 (1− D)d ′ (1− D)d ′ (1− D)d (1− D)d
Here d = 12 +
√D(1− D) and d ′ = 1
2 −√
D(1− D).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 26 of 36
![Page 77: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/77.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
One-sided EavesdroppingTwo-sided Eavesdropping
Success Probability Expressions
Theorem
The optimal success probability of Eve in guessing the bit sent byAlice is given by 1
2 +√
D(1− D).
Corollary
Success probability for guessing both Alice’s and Bob’s bit isP1(D) = 1
2 d = 14 + 1
2
√D(1− D).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 27 of 36
![Page 78: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/78.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
One-sided EavesdroppingTwo-sided Eavesdropping
Eve’s Likelihoods P(V = v | A = a,B = b)
V A = 0,B = 0 A = 0,B = 1 A = 1,B = 0 A = 1,B = 10000 1
4 (1− D)2d+14 (1− D)2d2
14 (1− D)2d2
14 (1− D)2d−
0001 14 D(1− D)d2
14 D(1− D)d+
14 D(1− D)d−
14 D(1− D)d2
0010 14 D(1− D)d+
14 D(1− D)d2
14 D(1− D)d2
14 D(1− D)d−
0011 14 (1− D)2d2
14 (1− D)2d+
14 (1− D)2d−
14 (1− D)2d2
· · · · · · · · · · · · · · ·1100 1
4 (1− D)2d214 (1− D)2d−
14 (1− D)2d+
14 (1− D)2d2
1101 14 D(1− D)d−
14 D(1− D)d2
14 D(1− D)d2
14 D(1− D)d+
1110 14 D(1− D)d2
14 D(1− D)d−
14 D(1− D)d+
14 D(1− D)d2
1111 14 (1− D)2d−
14 (1− D)2d2
14 (1− D)2d2
14 (1− D)2d+
Here d± = (√
1− D ±√
D)4 and d2 = (1− 2D)2.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 28 of 36
![Page 79: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/79.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
One-sided EavesdroppingTwo-sided Eavesdropping
Success Probability Expressions
Theorem
The optimal success probability of Eve in guessing a pair of bitssent by Alice and Bob is given byP2(D) = 1
4 + D(1− D) +√
D(1− D).
Corollary
Introducing a disturbance ∆, the optimal success probability of Evein guessing a pair of bits sent by Alice and Bob is given by14 + ∆
2 +√
∆2 .
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 29 of 36
![Page 80: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/80.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
One-sided EavesdroppingTwo-sided Eavesdropping
Eve’s optimal guesses corresponding to her measurementoutcomes
V 0000 0001 0010 0011 0100 0101 0110 0111GA,GB 0, 0 0, 1 0, 0 0, 1 1, 0 1, 1 1, 0 1, 1
V 1000 1001 1010 1011 1100 1101 1110 1111
GA,GB 0, 0 0, 1 0, 0 0, 1 1, 0 1, 1 1, 0 1, 1
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 30 of 36
![Page 81: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/81.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 82: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/82.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Error Location in BB84
If Alice sends |0〉, then Eve will obtain either |E00〉 or |E01〉.Eve now measures in {|00〉, |01〉, |10〉, |11〉} basis.
If Eve observes |00〉 or |11〉, then she knows that Bobobtained |0〉, i.e., no error has been introduced.
If Eve observes |01〉 or |10〉, then she knows that Bobobtained |1〉, i.e., error has been introduced.
Thus, in BB84 protocol, Eve can decide with certaintywhether her interaction has introduced an error or not.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 31 of 36
![Page 83: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/83.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Error Location: One-sided Eavesdropping
In this case Alice and Bob produce the bits independently.
So, looking at Alice’s bit, it is not possible to know whathappens in case of Bob’s bit.
Thus, Alice has no advantage.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 32 of 36
![Page 84: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/84.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Error Location: Two-sided Eavesdropping
A B GA GB P(A,B,GA,GB)Error Guessed
by Eve correctly
0 0
0 0 116 d+ Y
0 1 116 d2 N
1 0 116 d2 N
1 1 116 d− Y
0 1
0 0 116 d2 N
0 1 116 d+ Y
1 0 116 d− Y
1 1 116 d2 N
Similarly, AB = 10 and 11 can also be analyzed.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 33 of 36
![Page 85: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/85.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
Probability of Eve’s Guessing the Error Location
Theorem
Eve can guess whether an error has been introduced between Aliceand Bob or not with probability 1
2 + 2D(1− D).
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 34 of 36
![Page 86: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/86.jpg)
Roadmap
1 Review of Quantum Information
2 Key Distribution using BB84The ProtocolSecurity Issues
3 MDI QKD
4 Attack ModelFor BB84For MDI QKD on one sideFor MDI QKD on both sides
5 Eve’s Success ProbabilitiesOne-sided EavesdroppingTwo-sided Eavesdropping
6 Guessing the Location of Errors
7 ConclusionSummaryFuture Work
![Page 87: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/87.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Summary
We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.
It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.
Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.
The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.
In terms of location of errors, MDI-QKD leaks lessinformation than BB84.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36
![Page 88: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/88.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Summary
We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.
It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.
Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.
The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.
In terms of location of errors, MDI-QKD leaks lessinformation than BB84.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36
![Page 89: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/89.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Summary
We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.
It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.
Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.
The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.
In terms of location of errors, MDI-QKD leaks lessinformation than BB84.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36
![Page 90: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/90.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Summary
We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.
It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.
Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.
The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.
In terms of location of errors, MDI-QKD leaks lessinformation than BB84.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36
![Page 91: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/91.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Summary
We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.
It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.
Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.
The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.
In terms of location of errors, MDI-QKD leaks lessinformation than BB84.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36
![Page 92: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/92.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Summary
We have studied eavesdropping strategy on a recentlyproposed variant of BB84, which is refereed to as MDI QKD.
It can be shown that for the one-sided case, Eve needs tomeasure only the second qubit and for the two-sided case sheneeds to measure only the second and the fourth qubits.
Performing the attack on only one side is equivalent toperforming the attack on both sides and then observing theresult for only one side.
The attack on BB84 is sharper than that on MDI QKD. Butthe latter case is more challenging for Eve.
In terms of location of errors, MDI-QKD leaks lessinformation than BB84.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 35 of 36
![Page 93: Symmetric Incoherent Eavesdropping against MDI QKDmatthew/Talks/Thursday/Morning/wcc... · Conclusion Basic Quantum Algebra for a Single Particle Thestate j iof a single particle](https://reader036.vdocument.in/reader036/viewer/2022071010/5fc7de2300b0616f06408282/html5/thumbnails/93.jpg)
Review of Quantum InformationKey Distribution using BB84
MDI QKDAttack Model
Eve’s Success ProbabilitiesGuessing the Location of Errors
Conclusion
SummaryFuture Work
Future Work
To analyze different “device independent” protocols undersimilar attack models.
To investigate countermeasures against this type of attacks.
Goutam Paul Symmetric Incoherent Eavesdropping against MDI QKD Slide 36 of 36