Quantum Key Distribution
Quantum Key Distribution
Basic Ideas
16-10-2024
OTP and Beyond
Alice:
1. Generate two uniformly random strings: a, b ∈R {0, 1}m .
2. Prepare qubit states: |ψa0 b0 i, |ψa1 b1 i, · · · , |ψam−1 bm−1 i
3. Send the m qubits to Bob using the quantum channel.
Ideal/Honest World
Alice:
1. Generate two uniformly random strings: a, b ∈R {0, 1}m .
2. Prepare qubit states: |ψa0 b0 i, |ψa1 b1 i, · · · , |ψam−1 bm−1 i
3. Send the m qubits to Bob using the quantum channel.
Bob:
1. Generate a uniformly random string b0 ∈R {0, 1}m .
2. Measure the i-th qubit received in Bbi0 for 0 ≤ i ≤ m − 1.
3. Record the outcome of the measurements: a0 = a00 a10 · · · am−1
0
What is a0 ?
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
Toy Example
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
Toy Example
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
b0 0 1 1 0 1 1 0 0
Toy Example
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
b0 0 1 1 0 1 1 0 0
a0 0 0 0 1 0 0 1 0
Toy Example
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
b0 0 1 1 0 1 1 0 0
a0 0 0 0 1 0 0 1 0
ã 0 1 0 0
Real world
• In reality communication channels are prone to both malicious
Eve and random noise!
• So we need additional measures to ensure that Alice and Bob
can securely derive the same key.
Real world
• In reality communication channels are prone to both malicious
Eve and random noise!
• So we need additional measures to ensure that Alice and Bob
can securely derive the same key.
• Classical channel: What can Eve do if she can modify the
messages?
Real world
• In reality communication channels are prone to both malicious
Eve and random noise!
• So we need additional measures to ensure that Alice and Bob
can securely derive the same key.
• Classical channel: What can Eve do if she can modify the
messages?
• (Wo)Man-in-the-Middle Attack
• Play the role of Bob with Alice
• Play the role of Alice with Bob
• Work out the details of the attack.
Real world
• In reality communication channels are prone to both malicious
Eve and random noise!
• So we need additional measures to ensure that Alice and Bob
can securely derive the same key.
• Classical channel: What can Eve do if she can modify the
messages?
• (Wo)Man-in-the-Middle Attack
• Play the role of Bob with Alice
• Play the role of Alice with Bob
• Work out the details of the attack.
• Countermeasure?
Real world
• In reality communication channels are prone to both malicious
Eve and random noise!
• So we need additional measures to ensure that Alice and Bob
can securely derive the same key.
• Classical channel: What can Eve do if she can modify the
messages?
• (Wo)Man-in-the-Middle Attack
• Play the role of Bob with Alice
• Play the role of Alice with Bob
• Work out the details of the attack.
• Countermeasure? authenticate the messages sent over
classical channel!
Real world
• In reality communication channels are prone to both malicious
Eve and random noise!
• So we need additional measures to ensure that Alice and Bob
can securely derive the same key.
• Classical channel: What can Eve do if she can modify the
messages?
• (Wo)Man-in-the-Middle Attack
• Play the role of Bob with Alice
• Play the role of Alice with Bob
• Work out the details of the attack.
• Countermeasure? authenticate the messages sent over
classical channel!
• A Circularity? To agree upon a shared key, Alice and Bob need
to start with a shared key in the first place!
Quantum Channel
• Suppose Alice first shares b with Bob and then sends the
qubits.
Quantum Channel
• Suppose Alice first shares b with Bob and then sends the
qubits.
• Intercept and Resend: Eve will capture the i-th qubit,
measure and then resend.
Quantum Channel
• Suppose Alice first shares b with Bob and then sends the
qubits.
• Intercept and Resend: Eve will capture the i-th qubit,
measure and then resend.
• b must not be revealed beforehand: Eve can still guess bi with
probability 1/2.
• Case 1: If correct, Eve’s action remains undetected.
• Case 2: Eve’s prediction is wrong:
Quantum Channel
• Suppose Alice first shares b with Bob and then sends the
qubits.
• Intercept and Resend: Eve will capture the i-th qubit,
measure and then resend.
• b must not be revealed beforehand: Eve can still guess bi with
probability 1/2.
• Case 1: If correct, Eve’s action remains undetected.
• Case 2: Eve’s prediction is wrong:
• Eve’s measurement result is random and so is the state that
she sends
• Suppose Bob has chosen the correct basis: bi0 = bi .
• But now, ai0 ∈R {0, 1}.
Quantum Channel
• Suppose Alice first shares b with Bob and then sends the
qubits.
• Intercept and Resend: Eve will capture the i-th qubit,
measure and then resend.
• b must not be revealed beforehand: Eve can still guess bi with
probability 1/2.
• Case 1: If correct, Eve’s action remains undetected.
• Case 2: Eve’s prediction is wrong:
• Eve’s measurement result is random and so is the state that
she sends
• Suppose Bob has chosen the correct basis: bi0 = bi .
• But now, ai0 ∈R {0, 1}.
• Suppose Alice and Bob publicly compare ai and ai0 where
bi0 = bi :
• What’s the probability of detecting error if Eve intercepted and
resent that qubit?
Quantum Channel
• Suppose Alice first shares b with Bob and then sends the
qubits.
• Intercept and Resend: Eve will capture the i-th qubit,
measure and then resend.
• b must not be revealed beforehand: Eve can still guess bi with
probability 1/2.
• Case 1: If correct, Eve’s action remains undetected.
• Case 2: Eve’s prediction is wrong:
• Eve’s measurement result is random and so is the state that
she sends
• Suppose Bob has chosen the correct basis: bi0 = bi .
• But now, ai0 ∈R {0, 1}.
• Suppose Alice and Bob publicly compare ai and ai0 where
bi0 = bi :
• What’s the probability of detecting error if Eve intercepted and
resent that qubit? 1/4
Estimating Error
• Next step for Alice and Bob is to estimate the bit error rate:
• BER: proportion of bits in ã0 that are not equal to those in ã.
Estimating Error
• Next step for Alice and Bob is to estimate the bit error rate:
• BER: proportion of bits in ã0 that are not equal to those in ã.
• Alice and Bob use the classical channel to reveal a random
subset of ã and ã0 .
• Half the bits chosen of ã and ã0 at random indices are
compared (and discarded).
• Alice and Bob know how many bits in the revealed samples
differ.
• Assume the proportion of errors in undisclosed bits is
approximately same.
• If error is above some predetermined threshold (t); they abort
the protocol
Toy Example with Eve
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
be 1 0 1 0 1 1 1 1
ψeve ψ11 ψ10 ψ01 ψ10 ψ01 ψ11 ψ11 ψ01
Toy Example with Eve
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
be 1 0 1 0 1 1 1 1
ψeve ψ11 ψ10 ψ01 ψ10 ψ01 ψ11 ψ11 ψ01
b0 0 1 1 0 1 1 0 0
Toy Example with Eve
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
be 1 0 1 0 1 1 1 1
ψeve ψ11 ψ10 ψ01 ψ10 ψ01 ψ11 ψ11 ψ01
b0 0 1 1 0 1 1 0 0
a0 0 1 0 1 0 1 1 0
Toy Example with Eve
a 1 0 0 1 0 1 1 0
b 1 1 0 0 1 0 1 0
ψ ψ11 ψ01 ψ00 ψ10 ψ01 ψ10 ψ11 ψ00
be 1 0 1 0 1 1 1 1
ψeve ψ11 ψ10 ψ01 ψ10 ψ01 ψ11 ψ11 ψ01
b0 0 1 1 0 1 1 0 0
a0 0 1 0 1 0 1 1 0
ã 0 1 0 0
ã0 1 1 0 0
Information Reconciliation
1
|ψ0 i = |0i; or |ψ1 i = √ (|0i + |1i)
2
• Bob measures either in B0 = {|0i, |1i} or B1 = √1 (|0i ± |1i)
2
• From measurement Bob obtains b ∈ {0, 1}.
• Based on public discussion they derive a common key.
Ekert91: Ekert proposed his protocol using EPR pair.
• Can be generated by Alice/Bob or a third-party, even Eve!
[Exercise] Study the details of B92 and Ekert91 Protocol.
QKD as Key Expansion