-
Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks
Authors:
Carlos Pascual-García,
Stefan Bäuml,
Mateus Araújo,
Rotem Liss,
Antonio Acín
Abstract:
Continuous variable quantum key distribution (CVQKD) with discrete modulation combines advantages of CVQKD, such as the implementability using readily available technologies, with advantages of discrete variable quantum key distribution, such as easier error correction procedures. We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob perfo…
▽ More
Continuous variable quantum key distribution (CVQKD) with discrete modulation combines advantages of CVQKD, such as the implementability using readily available technologies, with advantages of discrete variable quantum key distribution, such as easier error correction procedures. We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob performs a heterodyne measurement, the result of which is discretised in both key and test rounds. We provide a security proof against coherent attacks in the finite-size regime, and compute the achievable key rate. To this end, we employ the generalised entropy accumulation theorem, as well as recent advances in conic optimisation, yielding improved key rates compared to previous works. At metropolitan distances, our method can provide positive key rates for the order of $10^8$ rounds.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Geometry of entanglement and separability in Hilbert subspaces of dimension up to three
Authors:
Rotem Liss,
Tal Mor,
Andreas Winter
Abstract:
We present a complete classification of the geometry of the mutually complementary sets of entangled and separable states in three-dimensional Hilbert subspaces of bipartite and multipartite quantum systems. Our analysis begins by finding the geometric structure of the pure product states in a given three-dimensional Hilbert subspace, which determines all the possible separable and entangled mixed…
▽ More
We present a complete classification of the geometry of the mutually complementary sets of entangled and separable states in three-dimensional Hilbert subspaces of bipartite and multipartite quantum systems. Our analysis begins by finding the geometric structure of the pure product states in a given three-dimensional Hilbert subspace, which determines all the possible separable and entangled mixed states over the same subspace. In bipartite systems, we characterise the 14 possible qualitatively different geometric shapes for the set of separable states in any three-dimensional Hilbert subspace (5 classes which also appear in two-dimensional subspaces and were found and analysed by Boyer, Liss and Mor [Phys. Rev. A 95:032308, 2017], and 9 novel classes which appear only in three-dimensional subspaces), describe their geometries, and provide figures illustrating them. We also generalise these results to characterise the sets of fully separable states (and hence the complementary sets of somewhat entangled states) in three-dimensional subspaces of multipartite systems. Our results show which geometrical forms quantum entanglement can and cannot take in low-dimensional subspaces.
△ Less
Submitted 21 June, 2024; v1 submitted 10 September, 2023;
originally announced September 2023.
-
Simple and Rigorous Proof Method for the Security of Practical Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements
Authors:
Michel Boyer,
Gilles Brassard,
Nicolas Godbout,
Rotem Liss,
Stéphane Virally
Abstract:
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes, and practical devices are still not fully characterized for obtaining tight and realistic key rates…
▽ More
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes, and practical devices are still not fully characterized for obtaining tight and realistic key rates. We present a simple method of computing secure key rates for any practical implementation of discrete-variable QKD (which can also apply to measurement-device-independent QKD), initially in the single-qubit lossless regime, and we rigorously prove its unconditional security against any possible attack. We hope our method becomes one of the standard tools used for analysing, benchmarking, and standardizing all practical realizations of QKD.
△ Less
Submitted 3 July, 2023; v1 submitted 29 August, 2022;
originally announced August 2022.
-
Composable Security of Generalized BB84 Protocols Against General Attacks
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
Quantum key distribution (QKD) protocols make it possible for two parties to generate a secret shared key. One of the most important QKD protocols, BB84, was suggested by Bennett and Brassard in 1984. Various proofs of unconditional security for BB84 have been suggested, but the first security proofs were not composable. Here we improve a security proof of BB84 given by [Biham, Boyer, Boykin, Mor,…
▽ More
Quantum key distribution (QKD) protocols make it possible for two parties to generate a secret shared key. One of the most important QKD protocols, BB84, was suggested by Bennett and Brassard in 1984. Various proofs of unconditional security for BB84 have been suggested, but the first security proofs were not composable. Here we improve a security proof of BB84 given by [Biham, Boyer, Boykin, Mor, and Roychowdhury, J. Cryptology, 19(4):381-439, 2006] to be composable and match the state-of-the-art results for BB84, and we extend it to prove unconditional security of several variants of the BB84 protocol. Our composable security proof for BB84 and its variants is mostly self-contained, algebraic, and relatively simple, and it gives tight finite-key bounds.
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
Non-NP-Hardness of Translationally-Invariant Spin-Model Problems
Authors:
Rotem Liss,
Tal Mor,
Roman Shapira
Abstract:
Finding the ground state energy of the Heisenberg Hamiltonian is an important problem in the field of condensed matter physics. In some configurations, such as the antiferromagnetic translationally-invariant case on the 2D square lattice, its exact ground state energy is still unknown. We show that finding the ground state energy of the Heisenberg model cannot be an NP-Hard problem unless P=NP. We…
▽ More
Finding the ground state energy of the Heisenberg Hamiltonian is an important problem in the field of condensed matter physics. In some configurations, such as the antiferromagnetic translationally-invariant case on the 2D square lattice, its exact ground state energy is still unknown. We show that finding the ground state energy of the Heisenberg model cannot be an NP-Hard problem unless P=NP. We prove this result using a reduction to a sparse set and certain theorems from computational complexity theory. The result hints at the potential tractability of the problem and encourages further research towards a positive complexity result. In addition, we prove similar results for many similarly structured Hamiltonian problems, including certain forms of the Ising, t-J, and Fermi-Hubbard models.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Security Proof Against Collective Attacks for an Experimentally Feasible Semiquantum Key Distribution Protocol
Authors:
Walter O. Krawec,
Rotem Liss,
Tal Mor
Abstract:
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQ…
▽ More
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQKD protocol overcoming those drawbacks. The Mirror protocol was proven robust (namely, it was proven secure against a limited class of attacks including all noiseless attacks), but its security in case some noise is allowed (natural or due to eavesdrop**) has not been proved yet. Here we prove security of the Mirror protocol against a wide class of quantum attacks (the "collective attacks"), and we evaluate the allowed noise threshold and the resulting key rate.
△ Less
Submitted 3 July, 2023; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Quantum Communication -- Celebrating the Silver Jubilee of Teleportation
Authors:
Rotem Liss,
Tal Mor
Abstract:
This is an editorial paper presenting the meaning, history, and influence of quantum teleportation.
This is an editorial paper presenting the meaning, history, and influence of quantum teleportation.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems
Authors:
Rotem Liss,
Tal Mor
Abstract:
The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689 (2010)] is a practical attack, fully implementable against quantum key distribution systems. In contrast to almost all developments in quantum information processing (for example, Shor's factorization algorithm, quantum teleportation, Bennett-Brassard (BB84) quantum key distribution, the "Photon-Number Splitting" attack, an…
▽ More
The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689 (2010)] is a practical attack, fully implementable against quantum key distribution systems. In contrast to almost all developments in quantum information processing (for example, Shor's factorization algorithm, quantum teleportation, Bennett-Brassard (BB84) quantum key distribution, the "Photon-Number Splitting" attack, and many other examples), for which theory has been proposed decades before a proper implementation, the "Bright Illumination" attack preceded any sign or hint of a theoretical prediction. Here we explain how the "Reversed-Space" methodology of attacks, complementary to the notion of "quantum side-channel attacks" (which is analogous to a similar term in "classical" - namely, non-quantum - computer security), has missed the opportunity of predicting the "Bright Illumination" attack.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
Topological order on the Bloch sphere
Authors:
Rotem Liss,
Tal Mor,
Roman Orus
Abstract:
A Bloch sphere is the geometrical representation of an arbitrary two-dimensional Hilbert space. Possible classes of entanglement and separability for the pure and mixed states on the Bloch sphere were suggested by [M. Boyer, R. Liss, T. Mor, PRA 95, 032308 (2017)]. Here we construct a Bloch sphere for the Hilbert space spanned by one of the ground states of Kitaev's toric code model and one of its…
▽ More
A Bloch sphere is the geometrical representation of an arbitrary two-dimensional Hilbert space. Possible classes of entanglement and separability for the pure and mixed states on the Bloch sphere were suggested by [M. Boyer, R. Liss, T. Mor, PRA 95, 032308 (2017)]. Here we construct a Bloch sphere for the Hilbert space spanned by one of the ground states of Kitaev's toric code model and one of its closest product states. We prove that this sphere contains only one separable state, thus belonging to the fourth class suggested by the said paper. We furthermore study the topological order of the pure states on its surface and conclude that, according to conventional definitions, only one state (the toric code ground state) seems to present non-trivial topological order. We conjecture that most of the states on this Bloch sphere are neither ``trivial'' states (namely, they cannot be generated from a product state using a trivial circuit) nor topologically ordered. In addition, we show that the whole setting can be understood in terms of Grover rotations with gauge symmetry, akin to the quantum search algorithm.
△ Less
Submitted 29 March, 2020; v1 submitted 3 December, 2018;
originally announced December 2018.
-
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and prov…
▽ More
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the "simplified Mirror protocol") to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness.
△ Less
Submitted 18 July, 2018; v1 submitted 16 June, 2018;
originally announced June 2018.
-
Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z…
▽ More
Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous paper (Boyer, Gelles, and Mor, 2009), but it avoids a classical information-theoretical analysis and proves a fully composable security. We show that this modified BB84 protocol is as secure against collective attacks as the original BB84 protocol, and that it requires more bits for testing.
△ Less
Submitted 19 November, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous pap…
▽ More
The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous paper (Boyer, Gelles, and Mor, 2009), but it avoids the classical information-theoretical analysis that caused problems with composability. We show that this modified BB84 protocol is as secure against collective attacks as the original BB84 protocol, and that it requires more bits for testing.
△ Less
Submitted 5 April, 2017;
originally announced April 2017.
-
Experimentally feasible protocol for semiquantum key distribution
Authors:
Michel Boyer,
Matty Katz,
Rotem Liss,
Tal Mor
Abstract:
Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current…
▽ More
Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current technology. Here we suggest a new protocol, "Classical Alice with a controllable mirror", that can be experimentally implemented with current technology (using 4-level systems instead of qubits), and we prove it to be robust.
△ Less
Submitted 29 December, 2017; v1 submitted 24 January, 2017;
originally announced January 2017.
-
Geometry of entanglement in the Bloch sphere
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
Entanglement is an important concept in quantum information, quantum communication, and quantum computing. We provide a geometrical analysis of entanglement and separability for all the rank-2 quantum mixed states: complete analysis for the bipartite states, and partial analysis for the multipartite states. For each rank-2 mixed state, we define its unique Bloch sphere, that is spanned by the eige…
▽ More
Entanglement is an important concept in quantum information, quantum communication, and quantum computing. We provide a geometrical analysis of entanglement and separability for all the rank-2 quantum mixed states: complete analysis for the bipartite states, and partial analysis for the multipartite states. For each rank-2 mixed state, we define its unique Bloch sphere, that is spanned by the eigenstates of its density matrix. We characterize those Bloch spheres into exactly five classes of entanglement and separability, give examples for each class, and prove that those are the only classes.
△ Less
Submitted 8 March, 2017; v1 submitted 2 August, 2016;
originally announced August 2016.