SlideShare a Scribd company logo
1 of 32
Download to read offline
Institute for Theoretical
         Physics
 Quantum Information
          Group


Continuous Variable Quantum Key
           Distribution:
Finite-Key Analysis of Composable
Security against Coherent Attacks
                                      Fabian Furrer
                              Leibniz Universität Hannover
                            PRL 109, 100502
                             Joint work with
          T. Franz, R. F. Werner (Leibniz Universität Hannover)
             M. Berta, A. Leverrier, V.B. Scholz, (ETH Zurich)
                     M. Tomamichel (CQT Singapore)

                            Qcrypt 2012, Singapore, 14.09.2012
Security of a QKD Protocol




                                                                                                            Security Analysis
   Constraints:                                                                            -Key length
    Information theoretic                                                                 -Certification
    Experimental                                                                          of security


                              ?

   Experimental                                                                               Secure
   implementation                                                                             Key


Minimizing the assumption and maximizing the key length!

FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012                       Seite 2
Security of a QKD Protocol

   Constraints:
    Information theoretic
                 Asymptotic key rate vs. finite uses of QM channel (finite-key
                  effects)
                 Notion of security: composable?
                 Limitation on attacks: collective (tensor product) or coherent
                  (general)?
                 ...
         Experimental / Implementation
                 Model of the measurement devices
                 Model of the quantum source
                 ...



FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 3
Contribution: Security analysis for continuous
    variable (CV) protocol based on the distribution of two-mode
    squeezed states (EPR states) measured via homodyne
    detection.




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 4
Contribution: Security analysis for continuous
    variable (CV) protocol based on the distribution of two-mode
    squeezed states (EPR states) measured via homodyne
    detection.


       What’s New: Computation of key length secure against
    coherent attacks for achievable experimental parameters.

  Security proof based on Uncertainty relation
  (c.f. Tomamichel et al., Nat. Comm. 3, 634 ,2012)




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 5
Discrete Variables                             vs. Continuous Variables
                                                 Implementation

 -Encoding in finite-dimensional                                    -Encoding in infinite-dimensional
 systems (e.g., polarization of photon)                             systems (bosonic modes) [1]
                                                                         -Gaussian States
                                                                         -Quadratures of EM-field:
                                                                         Homodyne or Heterodyne
                                                                         detection

                                                                    Advantage:
                                                                    - Compatible with standard
                                                                    telecom technology
                                                                    - high repetition rates for homodyne
                                                                    - efficient state preparation

 [1] Weedbrook et al., Reviews of Modern Physics 84, 621 (2012)
FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012        Seite 6
Security Analysis for CV QKD Protocols

Challenge: infinite dimensions

Finite-Key Analysis:
- Leverrier et al, Phys. Rev. A 81, 062343 (2010)
- Berta, FF, Scholz, arXiv:1107.5460 (2011)

Lifting proofs from collective to coherent (general) attacks:
      Exponential de Finetti [Renner & Cirac, PRL 102, 110504 (2009)]
         Problem: Bad bounds, feasible only in the asymptotic limit
     Post-selection technique,
         Recent: Leverrier et al., arXiv:1208.4920 (Talk on Monday)




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 7
Security Analysis for CV QKD Protocols

Challenge: infinite dimensions

Finite-Key Analysis:
- Leverrier et al, Phys. Rev. A 81, 062343 (2010)
- Berta, FF, Scholz, arXiv:1107.5460 (2011)

Lifting proofs from collective to coherent (general) attacks:
      Exponential de Finetti [Renner & Cirac, PRL 102, 110504 (2009)]
         Problem: Bad bounds, feasible only in the asymptotic limit
     Post-selection technique,
         Recent: Leverrier et al., arXiv:1208.4920 (Talk on Monday)
Uncertainty Relation (direct) : This Talk!
         Advantage:
          one-sided device independent
          no tomography
          no additional measurements
FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 8
Outline

           1. Security Definition and Finite-key length formula

           2. Experimental Set Up and Protocol

           3. Finite-Key Rates

           4. (Security Analysis)




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 9
General QKD Protocol

                              Eve                            Bob           Part 1:
Alice                                                                      1) Distribution of quantum
                Distribution & Measurements
                                                                              state
                                                                           2) Measurements
                                                                           3) Parameter estimation
                                                                           4) Output: Raw keys
                                                                              or abort




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012        Seite 10
General QKD Protocol

                              Eve                            Bob           Part 1:
Alice                                                                      1) Distribution of quantum
                Distribution & Measurements
                                                                              state
                                                                           2) Measurements
                                                                           3) Parameter estimation
                                                                           4) Output: Raw keys
                    classical post processing                                 or abort
                                                                           Part 2:
                                                                           1) Error correction
                                                                           2) Privacy amplification
                                                                              Output: Key




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012        Seite 11
Security Definitions (trace distance)
  A protocol which outputs the state



  is secure if it is:
           correct :

                  secret:

                      where                   is the uniform distribution over all keys.

                                            Composable Secure*

* R. Renner, PhD Thesis (ETH 2005)

   FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 12
Classical Post Processing
1) Error Correction:
   Alice and Bob broadcast        bits to match their strings.
2) Privacy amplification via two-universal hash functions:
   ... apply random hash function from two-universal family onto                                        bits


                                                                                                   Key length




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012                Seite 13
Classical Post Processing
1) Error Correction:
   Alice and Bob broadcast        bits to match their strings.
2) Privacy amplification via two-universal hash functions:
   ... apply random hash function from two-universal family onto                                        bits


                                                                                                   Key length

Secure key of length:



                        Smooth min-entropy
  R. Renner, PhD Thesis (2005), M. Tomamichel et al. IEEE Trans. Inf. Theory, 57 (8) (2011),
  M. Berta, FF, V.B. Scholz, arXiv1107.5460 (infinite-dimensional side-information)




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012                Seite 14
Classical Post Processing
1) Error Correction:
   Alice and Bob broadcast        bits to match their strings.
2) Privacy amplification via two-universal hash functions:
   ... apply random hash function from two-universal family onto                                        bits


                                                                                                   Key length

Secure key of length:



                        Smooth min-entropy
  R. Renner, PhD Thesis (2005), M. Tomamichel et al. IEEE Trans. Inf. Th, 57 (8) (2011),
  M. Berta, FF, V.B. Scholz, arXiv1107.5460 (infinite-dimensional side-information)


     Use parameter estimation to bound min-entropy!
FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012                Seite 15
Experimental Set Up
                                                                                          Source:
                                                                                          two-mode squeezed
                                                                                          state (EPR state)

                                                                                          Measurements:
                                                                                          homodyne detection,
                                                                                          randomly either
                                                                                          amplitude or phase
                                                                                          (synchronized via LO)

                                                                                          Entanglement based!




Cerf, N. J., M. Levy, and G. van Assche, 2001, Phys. Rev. A 63, 052311
  FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012            Seite 16
Measurements
                                                                                        Source:
 Correlated outcomes if both measure
                                                                                        two-mode squeezed
 amplitude or phase:
                                                                                        state

                                                                                        Measurements:
                                                                                        homodyne detection,
                                                                                        randomly either
                                                                                        amplitude or phase
                                                                                        (synchronized via LO)

                                                                                        Entanglement based!




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012            Seite 17
Measurements
 Binning of the Outcome Range:


                                                                        Spacing parameter:
                                                                        Cutoff parameter:




                                                                       Outcome Range:




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 18
Protocol
1.      Performing 2N measurements

2. Sifting: approx. N data points left

3. Parameter estimation:
   pick random sample of k data points                                                       and check correlation:
   Hamming distance:


4. Classical post-processing on remaining strings                                                         :




     FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012             Seite 19
Protocol
1.      Performing 2N measurements

2. Sifting: approx. N data points left

3. Parameter estimation:
   pick random sample of k data points                                                       and check correlation:
   Hamming distance:


4. Classical post-processing on remaining strings                                                         :

     A secret key of length


     can be extracted


     FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012             Seite 20
Protocol
1.      Performing 2N measurements

2. Sifting: approx. N data points left

3. Parameter estimation:
   pick random sample of k data points                                                       and check correlation:
   Hamming distance:


4. Classical post-processing on remaining strings                                                         :

     A secret key of length                                      Statistical correction


     can be extracted                    Monotonic function
                   Complementarity of amplitude and phase
                   measurement: depending on spacing parameter
     FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012             Seite 21
Finite-Key Length
   The key is ...

         composable secure

         provides security against coherent attacks

   Experimental constraints:

         Alice’s measurements are modeled by projections onto spectrum of
          quadrature operator for amplitude and phase (parameter:     )

               subsequent measurements commute

         trusted source in Alice’s lab of Gaussian states (can be relaxed)

         No assumptions about Bob’s measurements: one-sided device
          independent


FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 22
Finite-Key Rates
  Key Rate       depending on symmetric losses for two-mode squeezed state
       input squeezing/antisqueezing 11dB/16dB *
       error correction efficiency of 95%
                                                * T. Eberle et al., arXiv:1110.3977
       excess noise of 1% *
       additional symmetric losses of ...


                                 0%

                                            4%
                                                                   6%



Plot: FF et al., PRL 109, 100502 (2012)

   FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 23
Key Rate versus Losses
      Key rate versus losses for N=10^9 sifted signal:




                                                                             Asymptotic optimal rate with
                                                                             perfect error correction


                            Coherent attacks                  Gaussian collective attacks




                                                                                        symmetric losses

Plot: FF et al., PRL 109, 100502 (2012)

      FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012      Seite 24
Security Analysis Based on Uncertainty Relation
Extractable key length:




                         Goal: bound for



Key ingredient: Uncertainty relation with side-information*




* Tomamichel & Renner, Phys. Rev. Lett. 106, 110506 (2011)


FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 25
Entropic Uncertainty Relation with Side
                         Information
     : Amplitude
                                                                   Eve
     : Phase
                               Alice                                                               Bob




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012         Seite 26
Entropic Uncertainty Relation with Side
                                Information
            : Amplitude
                                                                          Eve
            : Phase
                                      Alice                                                               Bob




                                 uncertainty Eve has about                            uncertainty of Bob about
                                 outcome of Alice                                     outcome of Alice




                                                                                          complementary of the
M. Tomamichel , PhD Thesis,                                                               measurements
M. Berta, FF, V.B. Scholz, arXiv1107.5460 (2011)

       FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012          Seite 27
Entropic Uncertainty Relation with Side
                                Information
            : Amplitude
                                                                          Eve
            : Phase
                                      Alice                                                               Bob




                 Data processing inequality

M. Tomamichel et al., Phys. Rev. Lett. 106,110506 (2011),
M. Tomamichel , PhD Thesis (2012); M. Berta, FF, V.B. Scholz, arXiv1107.5460 (2011)

       FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012         Seite 28
Entropic Uncertainty Relation with Side
                                Information
            : Amplitude
                                                                          Eve
            : Phase
                                      Alice                                                               Bob




                 Data processing inequality
                                                                                     Correlation betw. Alice & Bob
M. Tomamichel et al., Phys. Rev. Lett. 106,110506 (2011),
M. Tomamichel , PhD Thesis (2012); M. Berta, FF, V.B. Scholz, arXiv1107.5460 (2011)

       FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012         Seite 29
Correlation between Alice & Bob
Correlation between Alice and Bob can be bounded in terms of the
  Hamming distance of a random sample



via




Combining with Uncertainty Relation:




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 30
Conclusion
      Advantage:
       one-sided device independent (e.g. local oscillator included)
       direct approach (no additional measurements compared to post-
        selection approach)
       no state tomography
       robust under small deviations of experimental parameters
      Problems:
       very sensitive to noise
       asymptotically not optimal: Uncertainty relation not tight for the
        Gaussian states used in the protocol

      Implementation in Leibniz University in Hannover:
      Crypto on Campus: T. Eberle, V. Händchen, J. Duhme, T. Franz, R. F. Werner, and R.
           Schnabel

FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 31
Thank you for your attention!




FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012   Seite 32

More Related Content

What's hot

Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Sarp Online
 
Essentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesEssentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesteledynelecroy
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterIDES Editor
 
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...IDES Editor
 
IDS Survey on Entropy
IDS Survey  on Entropy IDS Survey  on Entropy
IDS Survey on Entropy Raj Kamal
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano GiordanoGoWireless
 

What's hot (7)

Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011
 
Essentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesEssentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slides
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan Register
 
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
 
IDS Survey on Entropy
IDS Survey  on Entropy IDS Survey  on Entropy
IDS Survey on Entropy
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 

Similar to Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks

design and testability.pptx
design and testability.pptxdesign and testability.pptx
design and testability.pptx19445KNithinbabu
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesIDES Editor
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Ericsson
 
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...ijcisjournal
 
Application_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdfApplication_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdfrukmagoud shakkari
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video trafficprasanna9
 
INSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDE
INSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDEINSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDE
INSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDEjmicro
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...IJECEIAES
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...eSAT Publishing House
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...eSAT Journals
 
AnupVMathur
AnupVMathurAnupVMathur
AnupVMathuranupmath
 
Lte sae-certification-course
Lte sae-certification-courseLte sae-certification-course
Lte sae-certification-courseKannan Selvam
 
Lte sae-certification-course
Lte sae-certification-courseLte sae-certification-course
Lte sae-certification-courseKannan Selvam
 
Namrata Shivtarkar_Senior Test Engineer_CV
Namrata Shivtarkar_Senior Test Engineer_CVNamrata Shivtarkar_Senior Test Engineer_CV
Namrata Shivtarkar_Senior Test Engineer_CVnamrata shivtarkar
 
Design of Kalman filter for Airborne Applications
Design of Kalman filter for Airborne ApplicationsDesign of Kalman filter for Airborne Applications
Design of Kalman filter for Airborne ApplicationsIJERA Editor
 
Nanometer Testing: Challenges and Solutions
Nanometer Testing: Challenges and SolutionsNanometer Testing: Challenges and Solutions
Nanometer Testing: Challenges and SolutionsDVClub
 

Similar to Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks (20)

design and testability.pptx
design and testability.pptxdesign and testability.pptx
design and testability.pptx
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
sumit_NEW
sumit_NEWsumit_NEW
sumit_NEW
 
241 250
241 250241 250
241 250
 
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
 
Application_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdfApplication_of_numerical_distance_relay.pdf
Application_of_numerical_distance_relay.pdf
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video traffic
 
INSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDE
INSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDEINSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDE
INSPECTION OF PROFILED FRP COMPOSITE STRUCTURES BY MICROWAVE NDE
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
AnupVMathur
AnupVMathurAnupVMathur
AnupVMathur
 
Lte sae-certification-course
Lte sae-certification-courseLte sae-certification-course
Lte sae-certification-course
 
Lte sae-certification-course
Lte sae-certification-courseLte sae-certification-course
Lte sae-certification-course
 
Namrata Shivtarkar_Senior Test Engineer_CV
Namrata Shivtarkar_Senior Test Engineer_CVNamrata Shivtarkar_Senior Test Engineer_CV
Namrata Shivtarkar_Senior Test Engineer_CV
 
Design of Kalman filter for Airborne Applications
Design of Kalman filter for Airborne ApplicationsDesign of Kalman filter for Airborne Applications
Design of Kalman filter for Airborne Applications
 
Nanometer Testing: Challenges and Solutions
Nanometer Testing: Challenges and SolutionsNanometer Testing: Challenges and Solutions
Nanometer Testing: Challenges and Solutions
 

More from wtyru1989

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperialwtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementwtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formationwtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rarewtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementwtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectorswtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theorywtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlwtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theoremwtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codeswtyru1989
 
标量量化
标量量化标量量化
标量量化wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012wtyru1989
 

More from wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks

  • 1. Institute for Theoretical Physics Quantum Information Group Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks Fabian Furrer Leibniz Universität Hannover PRL 109, 100502 Joint work with T. Franz, R. F. Werner (Leibniz Universität Hannover) M. Berta, A. Leverrier, V.B. Scholz, (ETH Zurich) M. Tomamichel (CQT Singapore) Qcrypt 2012, Singapore, 14.09.2012
  • 2. Security of a QKD Protocol Security Analysis Constraints: -Key length  Information theoretic -Certification  Experimental of security ? Experimental Secure implementation Key Minimizing the assumption and maximizing the key length! FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 2
  • 3. Security of a QKD Protocol Constraints:  Information theoretic  Asymptotic key rate vs. finite uses of QM channel (finite-key effects)  Notion of security: composable?  Limitation on attacks: collective (tensor product) or coherent (general)?  ...  Experimental / Implementation  Model of the measurement devices  Model of the quantum source  ... FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 3
  • 4. Contribution: Security analysis for continuous variable (CV) protocol based on the distribution of two-mode squeezed states (EPR states) measured via homodyne detection. FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 4
  • 5. Contribution: Security analysis for continuous variable (CV) protocol based on the distribution of two-mode squeezed states (EPR states) measured via homodyne detection. What’s New: Computation of key length secure against coherent attacks for achievable experimental parameters. Security proof based on Uncertainty relation (c.f. Tomamichel et al., Nat. Comm. 3, 634 ,2012) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 5
  • 6. Discrete Variables vs. Continuous Variables Implementation -Encoding in finite-dimensional -Encoding in infinite-dimensional systems (e.g., polarization of photon) systems (bosonic modes) [1] -Gaussian States -Quadratures of EM-field: Homodyne or Heterodyne detection Advantage: - Compatible with standard telecom technology - high repetition rates for homodyne - efficient state preparation [1] Weedbrook et al., Reviews of Modern Physics 84, 621 (2012) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 6
  • 7. Security Analysis for CV QKD Protocols Challenge: infinite dimensions Finite-Key Analysis: - Leverrier et al, Phys. Rev. A 81, 062343 (2010) - Berta, FF, Scholz, arXiv:1107.5460 (2011) Lifting proofs from collective to coherent (general) attacks:  Exponential de Finetti [Renner & Cirac, PRL 102, 110504 (2009)] Problem: Bad bounds, feasible only in the asymptotic limit Post-selection technique, Recent: Leverrier et al., arXiv:1208.4920 (Talk on Monday) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 7
  • 8. Security Analysis for CV QKD Protocols Challenge: infinite dimensions Finite-Key Analysis: - Leverrier et al, Phys. Rev. A 81, 062343 (2010) - Berta, FF, Scholz, arXiv:1107.5460 (2011) Lifting proofs from collective to coherent (general) attacks:  Exponential de Finetti [Renner & Cirac, PRL 102, 110504 (2009)] Problem: Bad bounds, feasible only in the asymptotic limit Post-selection technique, Recent: Leverrier et al., arXiv:1208.4920 (Talk on Monday) Uncertainty Relation (direct) : This Talk! Advantage:  one-sided device independent  no tomography  no additional measurements FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 8
  • 9. Outline 1. Security Definition and Finite-key length formula 2. Experimental Set Up and Protocol 3. Finite-Key Rates 4. (Security Analysis) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 9
  • 10. General QKD Protocol Eve Bob Part 1: Alice 1) Distribution of quantum Distribution & Measurements state 2) Measurements 3) Parameter estimation 4) Output: Raw keys or abort FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 10
  • 11. General QKD Protocol Eve Bob Part 1: Alice 1) Distribution of quantum Distribution & Measurements state 2) Measurements 3) Parameter estimation 4) Output: Raw keys classical post processing or abort Part 2: 1) Error correction 2) Privacy amplification Output: Key FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 11
  • 12. Security Definitions (trace distance) A protocol which outputs the state is secure if it is:  correct :  secret: where is the uniform distribution over all keys. Composable Secure* * R. Renner, PhD Thesis (ETH 2005) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 12
  • 13. Classical Post Processing 1) Error Correction: Alice and Bob broadcast bits to match their strings. 2) Privacy amplification via two-universal hash functions: ... apply random hash function from two-universal family onto bits Key length FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 13
  • 14. Classical Post Processing 1) Error Correction: Alice and Bob broadcast bits to match their strings. 2) Privacy amplification via two-universal hash functions: ... apply random hash function from two-universal family onto bits Key length Secure key of length: Smooth min-entropy R. Renner, PhD Thesis (2005), M. Tomamichel et al. IEEE Trans. Inf. Theory, 57 (8) (2011), M. Berta, FF, V.B. Scholz, arXiv1107.5460 (infinite-dimensional side-information) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 14
  • 15. Classical Post Processing 1) Error Correction: Alice and Bob broadcast bits to match their strings. 2) Privacy amplification via two-universal hash functions: ... apply random hash function from two-universal family onto bits Key length Secure key of length: Smooth min-entropy R. Renner, PhD Thesis (2005), M. Tomamichel et al. IEEE Trans. Inf. Th, 57 (8) (2011), M. Berta, FF, V.B. Scholz, arXiv1107.5460 (infinite-dimensional side-information) Use parameter estimation to bound min-entropy! FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 15
  • 16. Experimental Set Up Source: two-mode squeezed state (EPR state) Measurements: homodyne detection, randomly either amplitude or phase (synchronized via LO) Entanglement based! Cerf, N. J., M. Levy, and G. van Assche, 2001, Phys. Rev. A 63, 052311 FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 16
  • 17. Measurements Source: Correlated outcomes if both measure two-mode squeezed amplitude or phase: state Measurements: homodyne detection, randomly either amplitude or phase (synchronized via LO) Entanglement based! FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 17
  • 18. Measurements Binning of the Outcome Range:  Spacing parameter:  Cutoff parameter: Outcome Range: FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 18
  • 19. Protocol 1. Performing 2N measurements 2. Sifting: approx. N data points left 3. Parameter estimation: pick random sample of k data points and check correlation: Hamming distance: 4. Classical post-processing on remaining strings : FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 19
  • 20. Protocol 1. Performing 2N measurements 2. Sifting: approx. N data points left 3. Parameter estimation: pick random sample of k data points and check correlation: Hamming distance: 4. Classical post-processing on remaining strings : A secret key of length can be extracted FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 20
  • 21. Protocol 1. Performing 2N measurements 2. Sifting: approx. N data points left 3. Parameter estimation: pick random sample of k data points and check correlation: Hamming distance: 4. Classical post-processing on remaining strings : A secret key of length Statistical correction can be extracted Monotonic function Complementarity of amplitude and phase measurement: depending on spacing parameter FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 21
  • 22. Finite-Key Length The key is ...  composable secure  provides security against coherent attacks Experimental constraints:  Alice’s measurements are modeled by projections onto spectrum of quadrature operator for amplitude and phase (parameter: )  subsequent measurements commute  trusted source in Alice’s lab of Gaussian states (can be relaxed)  No assumptions about Bob’s measurements: one-sided device independent FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 22
  • 23. Finite-Key Rates Key Rate depending on symmetric losses for two-mode squeezed state  input squeezing/antisqueezing 11dB/16dB *  error correction efficiency of 95% * T. Eberle et al., arXiv:1110.3977  excess noise of 1% *  additional symmetric losses of ... 0% 4% 6% Plot: FF et al., PRL 109, 100502 (2012) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 23
  • 24. Key Rate versus Losses Key rate versus losses for N=10^9 sifted signal: Asymptotic optimal rate with perfect error correction Coherent attacks Gaussian collective attacks symmetric losses Plot: FF et al., PRL 109, 100502 (2012) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 24
  • 25. Security Analysis Based on Uncertainty Relation Extractable key length: Goal: bound for Key ingredient: Uncertainty relation with side-information* * Tomamichel & Renner, Phys. Rev. Lett. 106, 110506 (2011) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 25
  • 26. Entropic Uncertainty Relation with Side Information : Amplitude Eve : Phase Alice Bob FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 26
  • 27. Entropic Uncertainty Relation with Side Information : Amplitude Eve : Phase Alice Bob uncertainty Eve has about uncertainty of Bob about outcome of Alice outcome of Alice complementary of the M. Tomamichel , PhD Thesis, measurements M. Berta, FF, V.B. Scholz, arXiv1107.5460 (2011) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 27
  • 28. Entropic Uncertainty Relation with Side Information : Amplitude Eve : Phase Alice Bob Data processing inequality M. Tomamichel et al., Phys. Rev. Lett. 106,110506 (2011), M. Tomamichel , PhD Thesis (2012); M. Berta, FF, V.B. Scholz, arXiv1107.5460 (2011) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 28
  • 29. Entropic Uncertainty Relation with Side Information : Amplitude Eve : Phase Alice Bob Data processing inequality Correlation betw. Alice & Bob M. Tomamichel et al., Phys. Rev. Lett. 106,110506 (2011), M. Tomamichel , PhD Thesis (2012); M. Berta, FF, V.B. Scholz, arXiv1107.5460 (2011) FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 29
  • 30. Correlation between Alice & Bob Correlation between Alice and Bob can be bounded in terms of the Hamming distance of a random sample via Combining with Uncertainty Relation: FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 30
  • 31. Conclusion Advantage:  one-sided device independent (e.g. local oscillator included)  direct approach (no additional measurements compared to post- selection approach)  no state tomography  robust under small deviations of experimental parameters Problems:  very sensitive to noise  asymptotically not optimal: Uncertainty relation not tight for the Gaussian states used in the protocol Implementation in Leibniz University in Hannover: Crypto on Campus: T. Eberle, V. Händchen, J. Duhme, T. Franz, R. F. Werner, and R. Schnabel FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 31
  • 32. Thank you for your attention! FF, Continuous Variable QKD: Finite-Key Analysis against Coherent Attacks, Singapore, 14.09.2012 Seite 32