-
Private quantum channels for multi-photon pulses and unitary k-designs
Authors:
Jan Bouda,
Michal Sedlák,
Mario Ziman
Abstract:
We address the question of existence of private quantum channel for qubits encoded in polarization degrees of freedom of a photon, that remains secure even if multi-photon (instead of single-photon) pulse is emitted. We show that random unitary channel distributed according to SU(2) Haar measure has this property. Further we analyze the qubit unitary k-designs. We show they ensure security if the…
▽ More
We address the question of existence of private quantum channel for qubits encoded in polarization degrees of freedom of a photon, that remains secure even if multi-photon (instead of single-photon) pulse is emitted. We show that random unitary channel distributed according to SU(2) Haar measure has this property. Further we analyze the qubit unitary k-designs. We show they ensure security if the photons' parity of the source is guaranteed. Otherwise, the qubit unitary k-designs do not guarantee perfect security.
△ Less
Submitted 13 September, 2020;
originally announced September 2020.
-
General Measurements with Limited Resources and Their Application to Quantum Unambiguous State Discrimination
Authors:
Jan Bouda,
Daniel Reitzner
Abstract:
In this report we present a framework for implementing arbitrary $n$-outcome quantum measurement as a sequence of two-outcome measurements requiring only single ancillary qubit. Our procedure is the same as one presented in [Phys. Rev. A 77, 052104 (2008)] but in addition offers particular construction for a two-outcome partial measurements. We exemplify this framework on the unambiguous state dis…
▽ More
In this report we present a framework for implementing arbitrary $n$-outcome quantum measurement as a sequence of two-outcome measurements requiring only single ancillary qubit. Our procedure is the same as one presented in [Phys. Rev. A 77, 052104 (2008)] but in addition offers particular construction for a two-outcome partial measurements. We exemplify this framework on the unambiguous state discrimination. In the simplest case it gives the same construction as is known, if we opt for performing conclusiveness measurement first. However, it also offers possibility of performing measurement for one of the state outcomes, which shows flexibility of presented framework.
△ Less
Submitted 11 September, 2020;
originally announced September 2020.
-
Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science
Authors:
Jan Bouda,
Lukáš Holík,
Jan Kofroň,
Jan Strejček,
Adam Rambousek
Abstract:
MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions traditionally cover all areas of computer sci…
▽ More
MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions traditionally cover all areas of computer science (such as parallel and distributed computing, computer networks, modern hardware and its design, non-traditional computing architectures, information systems and databases, multimedia and graphics, verification and testing, computer security, as well as all related areas of theoretical computer science).
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
Device-independent randomness extraction for arbitrarily weak min-entropy source
Authors:
Jan Bouda,
Marcin Pawlowski,
Matej Pivoluska,
Martin Plesch
Abstract:
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent set…
▽ More
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent setting. To do this we use Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the random sequence $n$. Our protocol is robust, it can tolerate devices that malfunction with a probability drop** polynomially in $n$ at the cost of a minor increase of the number of devices used.
△ Less
Submitted 14 March, 2014; v1 submitted 5 February, 2014;
originally announced February 2014.
-
Weak randomness completely trounces the security of QKD
Authors:
Jan Bouda,
Matej Pivoluska,
Martin Plesch,
Colin Wilmott
Abstract:
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel im…
▽ More
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
△ Less
Submitted 9 June, 2012; v1 submitted 6 June, 2012;
originally announced June 2012.
-
Encryption with Weakly Random Keys Using Quantum Ciphertext
Authors:
J. Bouda,
M. Pivoluska,
M. Plesch
Abstract:
The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full informatio…
▽ More
The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full information about the plaintext if he has access to just two bits of information about the source (irrespective on length of the key). In this paper we show that for every weak random source there is a cryptosystem with a classical plaintext, a classical key, and a quantum ciphertext that bounds the adversary's probability p to guess correctly the plaintext strictly under the McInnes-Pinkas bound, except for a single case, where it coincides with the bound. In addition, regardless of the source of randomness, the adversary's probability p is strictly smaller than 1 as long as there is some uncertainty in the key (Shannon/min-entropy is non-zero). These results are another demonstration that quantum information processing can solve cryptographic tasks with strictly higher security than classical information processing.
△ Less
Submitted 17 February, 2012; v1 submitted 9 September, 2011;
originally announced September 2011.
-
Fair and optimistic quantum contract signing
Authors:
N. Paunkovic,
J. Bouda,
P. Mateus
Abstract:
We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged be…
▽ More
We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: its fairness is based on the laws of quantum mechanics. Thus, it is abuse-free, and the clients do not have to generate new keys for each message during the Exchange phase. We discuss a real-life scenario when the measurement errors and qubit state corruption due to noisy channels occur and argue that for real, good enough measurement apparatus and transmission channels, our protocol would still be fair. Our protocol could be implemented by today's technology, as it requires in essence the same type of apparatus as the one needed for BB84 cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states (based on B92 protocol) and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.
△ Less
Submitted 18 October, 2011; v1 submitted 15 June, 2011;
originally announced June 2011.
-
Non-malleable encryption of quantum information
Authors:
Andris Ambainis,
Jan Bouda,
Andreas Winter
Abstract:
We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected.
We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption wh…
▽ More
We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected.
We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption which is a unitary 1-design. Our other main results include a new proof of the lower bound of (d^2-1)^2+1 on the number of unitaries in a 2-design [Gross et al.], which lends itself to a generalization to approximate 2-design.
Furthermore, while in prime power dimension there is a unitary 2-design with =< d^5 elements, we show that there are always approximate 2-designs with O(epsilon^{-2} d^4 log d) elements.
△ Less
Submitted 12 February, 2009; v1 submitted 3 August, 2008;
originally announced August 2008.
-
Optimality of private quantum channels
Authors:
Jan Bouda,
Mario Ziman
Abstract:
We addressed the question of optimality of private quantum channels. We have shown that the Shannon entropy of the classical key necessary to securely transfer the quantum information is lower bounded by the entropy exchange of the private quantum channel $\cal E$ and von Neumann entropy of the ciphertext state $\varrho^{(0)}$. Based on these bounds we have shown that decomposition of private qu…
▽ More
We addressed the question of optimality of private quantum channels. We have shown that the Shannon entropy of the classical key necessary to securely transfer the quantum information is lower bounded by the entropy exchange of the private quantum channel $\cal E$ and von Neumann entropy of the ciphertext state $\varrho^{(0)}$. Based on these bounds we have shown that decomposition of private quantum channels into orthogonal unitaries (if exists) is optimizing the entropy. For non-ancillary single qubit PQC we have derived the optimal entropy for arbitrary set of plaintexts. In particular, we have shown that except when the (closure of the) set of plaintexts contains all states, one bit key is sufficient. We characterized and analyzed all the possible single qubit private quantum channels for arbitrary set of plaintexts. For the set of plaintexts consisting of all qubit states we have characterized all possible approximate private quantum channels and we have derived the relation between the security parameter and the corresponding minimal entropy.
△ Less
Submitted 10 October, 2007;
originally announced October 2007.
-
Using quantum key distribution for cryptographic purposes: a survey
Authors:
Romain Alléaume,
Cyril Branciard,
Jan Bouda,
Thierry Debuisschert,
Mehrdad Dianati,
Nicolas Gisin,
Mark Godfrey,
Philippe Grangier,
Thomas Langer,
Norbert Lutkenhaus,
Christian Monyk,
Philippe Painchault,
Momtchil Peev,
Andreas Poppe,
Thomas Pornin,
John Rarity,
Renato Renner,
Gregoire Ribordy,
Michel Riguidel,
Louis Salvail,
Andrew Shields,
Harald Weinfurter,
Anton Zeilinger
Abstract:
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the…
▽ More
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
△ Less
Submitted 4 December, 2014; v1 submitted 23 January, 2007;
originally announced January 2007.
-
Anonymous Transmission of Quantum Information
Authors:
Jan Bouda,
Josef Sprojcar
Abstract:
We propose a protocol for anonymous distribution of quantum information which can be used in two modifications. In the first modification the receiver of the message is publicly known, but the sender remains unknown (even to receiver). In the second modification the sender is known, but the receiver is unknown (even to sender). Our protocol achieves this goal with unconditional security using cl…
▽ More
We propose a protocol for anonymous distribution of quantum information which can be used in two modifications. In the first modification the receiver of the message is publicly known, but the sender remains unknown (even to receiver). In the second modification the sender is known, but the receiver is unknown (even to sender). Our protocol achieves this goal with unconditional security using classical anonymous message transfer proposed by Chaum as a subprotocol.
△ Less
Submitted 21 June, 2006; v1 submitted 15 December, 2005;
originally announced December 2005.
-
Limits and restrictions of private quantum channel
Authors:
Jan Bouda,
Mario Ziman
Abstract:
We study private quantum channels on a single qubit, which encrypt given set of plaintext states $P$. Specifically, we determine all achievable states $ρ^{(0)}$ (average output of encryption) and for each particular set $P$ we determine the entropy of the key necessary and sufficient to encrypt this set. It turns out that single bit of key is sufficient when the set $P$ is two dimensional. Howev…
▽ More
We study private quantum channels on a single qubit, which encrypt given set of plaintext states $P$. Specifically, we determine all achievable states $ρ^{(0)}$ (average output of encryption) and for each particular set $P$ we determine the entropy of the key necessary and sufficient to encrypt this set. It turns out that single bit of key is sufficient when the set $P$ is two dimensional. However, the necessary and sufficient entropy of the key in case of three dimensional $P$ varies continuously between 1 and 2 bits depending on the state $ρ^{(0)}$. Finally, we derive private quantum channels achieving these bounds. We show that the impossibility of universal NOT operation on qubit can be derived from the fact that one bit of key is not sufficient to encrypt qubit.
△ Less
Submitted 14 June, 2005;
originally announced June 2005.
-
Entanglement swap** between multi-qudit systems
Authors:
Jan Bouda,
Vladimir Buzek
Abstract:
We generalize the entanglement swap** scheme originally proposed for two pairs of qubits to an arbitrary number $q$ of systems composed from an arbitrary number $m_j$ of qudits. Each of the system is supposed to be prepared in a maximally entangled state of $m_j$ qudits, while different systems are not correlated at all. We show that when a set $\sum_{j=1}^q a_j$ particles (from each of the…
▽ More
We generalize the entanglement swap** scheme originally proposed for two pairs of qubits to an arbitrary number $q$ of systems composed from an arbitrary number $m_j$ of qudits. Each of the system is supposed to be prepared in a maximally entangled state of $m_j$ qudits, while different systems are not correlated at all. We show that when a set $\sum_{j=1}^q a_j$ particles (from each of the $q$ systems $a_j$ particles are measured) are subjected to a generalized Bell-type measurement, the resulting set of $\sum_{j=1}^q (m_j-a_j)$ particles will collapse into a maximally entangled state.
△ Less
Submitted 19 January, 2002; v1 submitted 4 December, 2001;
originally announced December 2001.
-
Purification and correlated measurements of bipartite mixed states
Authors:
Jan Bouda,
Vladimir Buzek
Abstract:
We prove that all purifications of a non-factorable state (i.e., the state which cannot be expressed in a form $ρ_{AB}=ρ_A\otimesρ_B$) are entangled. We also show that for any bipartite state there exists a pair of measurements which are correlated on this state if and only if the state is non-factorable.
We prove that all purifications of a non-factorable state (i.e., the state which cannot be expressed in a form $ρ_{AB}=ρ_A\otimesρ_B$) are entangled. We also show that for any bipartite state there exists a pair of measurements which are correlated on this state if and only if the state is non-factorable.
△ Less
Submitted 3 December, 2001;
originally announced December 2001.