380 likes | 434 Views
Quantum key distribution with polarized coherent states. Antonio Vidiella Barranco vidiella@ifi.unicamp.br. Quantum Optics Group Instituto de Física “Gleb Wataghin” Universidade Estadual de Campinas 13083-970 Campinas SP Brazil. Quantum Optics Group.
E N D
Quantum key distribution with polarized coherent states Antonio Vidiella Barranco vidiella@ifi.unicamp.br Quantum Optics Group Instituto de Física “Gleb Wataghin” Universidade Estadual de Campinas 13083-970 Campinas SP Brazil
Quantum Optics Group People involved with quantum cryptography • Dr. Antonio Vidiella Barranco • Dr. José A. Roversi • Mr. Luis F.M. Borelli • Mr. Leandro da S. Aguiar • Mr. Felipe de C. Lourenço Sponsored by
Outline • Introduction • Quantum key distribution protocols • Stokes variables • Polarized coherent states • An all continuous variable protocol • Conclusions
Introduction Quantum key distribution (QKD) After twenty years of BB84 we have witnessed a few advances, J.A. Smolin, IBM J. Res. & Dev. 48, 47 (2004)
such as the first bank transfer using QKDin 2004 Bank QKD in a “real environment” 1.45 km long fibres Vienna City Hall A. Poppe et al., Optics Express 12, 3865 (2004)
As well as the first quantum network QNet http://www.bbn.com/networking/quantumcryptography.html
What we would like to achieve • Use of available sources of light and detectors • Higher speed transmission rate • Secure transmission over noisier transmission lines • Integration with conventional communication systems
Single photon sources • Difficult to build ! Most developed; fibres and free-space Implementations of QKD 2. Weak laser pulses
4. Continuous variables Emerging field Implementations of QKD 3.Entangled beams Offerssecurity advantages
or or Quantum protocols Polarization states are at the heart of BB84 • It employs highly distinct states Vertical basis Diagonal basis
or Quantum protocols • Security based on the fact that If someone (Eve) uses an incompatible basis, a “wrong” state comes out prepare measure
Continuous variables QKD • Alternative to single photon schemes • First schemes were hybrid ones Continuous variables but discrete encoding(in bits) M. Hillery, Phys. Rev. A61, 022309 (2000) T.C. Ralph, Phys. Rev. A 61, 010303(R) (2000)
Encoding variables Continuous variables QKD • Quadrature operators Uncertainty principle
X2 X1 Continuous variables QKD • Squeezed states seemed natural candidates But again, not so easy to generate and transmit!
Also uses Continuous variables QKD • Other methods Bright entangled beams Effects of losses? Synchronization Ch., Silberhorn, N. Korolkova, G. Leuchs, Phys. Rev. Lett. 88, 167902 (2002)
Continuous variables QKD Coherent states Readily available sources → laser light No need of squeezed or entangled sources key encoding in F. Grosshans and P. Grangier , Phys. Rev. Lett. 88, 057902 (2002)
Continuous variables QKD • Gaussian modulation • of signal guarantees • secure transmission • through lossy lines • …but requires • synchronized stations • for homodyne detection • …can we go further? F. Grosshans et al., Nature421, 238 (2002).
Continuous variables QKD • Up to now the key elements have been the amplitude (X1) and phase (X2) quadratures • Are there other convenient encoding variables ? Polarization variables !!! S. Lorenz, N. Korolkova, G. Leuchs, quant-ph/0403064 L.F.M. Borelli and AVB, quant-ph/0403076
Stokes variables • Classical optics Stokes parameters Electromagnetic (polarized) wave
Stokes operators • Quantum optics Stokes operators Non-commuting, e.g.,
Stokes operators • For a two-mode coherent state The same values as for a classical wave → quasi-classical state
Classical wave + fluctuations Stokes operators • But exhibits quantum fluctuations in polarization
Polarized coherent states • Highly polarized beams in x direction Convenient to normalize Analogue to quadratures
All continuous protocol • Key elements Alice prepares a highly polarized beam, so that S2and S3 are small modulations randomly drawn from a Gaussian distribution with variance Vm AVB and L.F.M. Borelli, submitted for publication
λ/2 λ/4 Laser EOM MOM λ/2 PBS While Eve eavesdrops All continuous protocol Classical channel Bob randomly measures eitherS2or S3 Alice sends the modulated signal to Bob via a noisy quantum channel Quantum channel
strings ofreal numbers, instead All continuous protocol After several transmissions… Not a secret shared key yet!
Classical channel All continuous protocol Reconciliation and privacy amplification → classical operations on numbers ? secret binary key N.J. Cerf, S. Iblisdir and G. Van Assche, Eur. Phys. J. D 18 211 (2002); G. Van Assche, J. Cardinal and N.J. Cerf, IEEE Transac on Inf. Theory 50, 394 (2004)
UQCM S2A S2B S2E Noise All continuous protocol Security under cloning attack QM
All continuous protocol • If Bob and Eve measure different Stokes parameters, For convenience we may normalize the deviations to S0
All continuous protocol obtaining Crossed uncertainty relation even a little noise in Eve’s copy (∆E) will cause a disturbance on Bob’s one (∆B)
Bob’s signalvariance Noise variance All continuous protocol • Gaussian noisy channel Shannon’s formula for Alice and Bob mutual information
Eve’s signalvariance Noise variance All continuous protocol • Gaussian noisy channel Shannon’s formula for Alice and Eve mutual information
All continuous protocol We may again normalize Because of the no-cloning theorem, the minimum noise added by Eve will be and therefore
All continuous protocol • In order to have a secure key distillation it must hold (for direct reconciliation) Using the expressions above for IAB and IAEwe obtain
All continuous protocol • If v<1 ΔI increases as a function of the modulation variancevm • Losses are related to the noise in the quantum channel – for a line with transmission η, Secure transmission in a channel with η < 0.5 F. Grosshans and P. Grangier , Phys. Rev. Lett. 88, 057902 (2002)
Another protocol • Key encoding using four Stokes parameters Overlap of polarization states due to quantum noise makes it impossible to Eve to distinguish among them. Bob simply discards events below a certain threshold →post-selection Key exchange with η ~ 0.64 S. Lorenz, N. Korolkova, G. Leuchs, App. Phys. B 79, 273 (2004)
Conclusions • New possibilities for continuous variable QKD • “Key carriers” → polarized coherent states • Easy to generate • Encoding in Stokes parameters • Easy to modulate • Easy to measure • But still a lot of work to be done → new reconciliation procedures, attacks, etc. • Experimental work being carried out