Lecture7 Fa07
Lecture7 Fa07
1 Readings
Benenti, Casati, and Strini:
Superdense Coding Ch.4.4
Quantum Cryptography Ch. 4.1, 4.3
2 Superdense Coding
Super dense coding is the less popular sibling of teleportation. It can actually be viewed as the process in
reverse. The idea is to transmit two classical bits of information by only sending one quantum bit. The
process starts out with an EPR pair that is shared between the sender (Alice) and receiver (Bob).
ψ = √12 00 + 11
This transforms the EPR pair φ + into the four Bell (EPR) states φ + , φ − , ψ + , and ψ − , respec-
tively:
1
1 0 √1
√1
0
√1
• 00: 00 + 11 −→ 00 + 11 =
0 1 2 2 2 0
1
0
0 1 √1 1
00 + 11 −→ √12 10 + 01 = √12
• 01:
1 0 2 1
0
1
1 0 √1 0
00 + 11 −→ √12 00 − 11 = √12
• 10:
0 −1 2 0
−1
The key to super-dense coding is that these four Bell states are orthonormal and are hence distinguishable
by a quantum measurement, in this case a two-qubit measurement made by Bob. This measurement can be
performed directly in the Bell basis. Alternatively, Bob can first run the quantum circuit for forming Bell
states from computational basis states backwards, and then measure in the computational basis to get either
00, 01, 10, or 11.
Examining this process in more detail:
ψ00 = √12 00 + 11 = √12 0 0 + 1 1
ψ01 = √1 √1
2
10 + 01 = 2
1 0 + 0 1
us: √12
apply CNot gives 1 1 + 0 1
√1 √1
apply H gives us: 0 − 1 1 + 0 + 1 1 =
2 2
1
2 01 − 11 + 01 + 11 = 01
Bob now measures both qubits to get Alice’s message 01
ψ10 = √1 √1
2
00 − 11 = 2
0 0 − 1 1
us: √12
apply CNot gives 0 0 − 1 0
√1 √1
apply H gives us: 0 + 1 0 + 1 − 0 0 =
2 2
1
2 00 + 10 + 10 − 00 = 10
Bob now measures both qubits to get Alice’s message 10
3 Quantum Cryptography
Cryptography is the science(or art, depending on your perspective) of secret communication. Successful
cryptography should also be able to detect eavesdropping. Quantum cryptography enables two parties, Alice
(the sender) and Bob (the receiver), to send a secret message and also to detect whether an eavesdropper
(Eve) is trying to listen in. This remarkable feature is due to the impossibility of copying an unknown
quantum state (no-cloning theorem). We shall first summarize the classical protocol for a secure code (one-
time key pad), then describe two quantum protocols for secure key distribution.
• take a secret key shared only between sender and receiver, consisting of a random binary sequence of
same length n as the binary message
k1 , k2 , ...kn
• the cypher text to be transmitted over an insecure channel is obtained as the bitwise sum modulo 2 of
the plaintext and keytext, ci = pi ⊕ ki
The receiver can then invert the cypher text to reconstruct the plaintext if he/she possesses the secret key
ki . This classical protocol is provably secure if the key is truly secret, the key is used only once (since the
plaintext is not random and will have redundancies that will enable decoding by clever pattern recognition
if the key is used multiple times), and the key is truly random. In order to guarantee security, the two parties
need therefore to
i) be able to generate long random binary strings, one for each message
ii) to be able to share the secret keys without other parties gaining access.
Neither of these requirements are easy in practice.
If Alice measures +, then Bob will automatically have − since the EPR pairs are entangled and perfectly
anticorrelated. Now Eve intercepts Bob’s qubit. She knows the protocol but now has to guess which basis
to measure in, since Alice’s choice of basis for each measurement is privately determined. Suppose Eve
• Transmission of long string of EPR pairs ψ − to Alice and Bob (or Alice sends second qubit of a
pair she generates to Bob)
Alice measures randomly in 0/1 or +/- basis
Bob measures randomly in 0/1 or +/- basis
Eve does her best, so measures also randomly in 0/1 or +/- basis
• After n EPR pairs have been processed, Alice and Bob broadcast their measurement bases (but not
the results of the measurements)
They compare their bases and divide the n sets of measurements into 3 groups:
i) same bases used by Alice and Bob
ii) different bases used by Alice and Bob
iii) dud measurement, either Alice or Bob failed to record a qubit (loss)
Group iii) is rejected.
• Alice and Bob share, i.e., reveal publicly, the measurement results from group ii) and some of those
from group i). They use these to evaluate the Bell correlation | < g > | = | < AB > + < A′ B > + <
AB′ > − < A′ B′ > |. If | < g > | > 2 then all pairs are entangled, there is no Eve and the key will be
secret. If | < g > | < 2 they know that the entanglement is removed, only classical correlations remain
and Eve is listening in.
• If the entanglement signifies no Eve, Alice and Bob then take the remainder of their measurements
from group i) and use these anticorrelated measurements to construct the secret key as before.
• Alice sends a single qubit to Bob in either the 0/1 or +/- basis. Thus Alice is randomly encoding into
one of two non-orthogonal bases. On average she sends half in each basis.
• Bob decides at random whether to measure in the 0/1 or +/- basis. On average he measures half in
each basis.
ψ u → ψ v
φ u → φ v′
with v 6= v′ so that she can measure the ancillas v and v′ and thereby distinguish whether the
initial state was ψ or φ , since inner products are preserved under unitaries. Hence v v′ ψ φ =
u u ψ φ = ψ φ which implies that v v′ = 1, i.e., v and v′ are the same state. So Eve has
to make a measurement. But she cannot measure in both bases simultaneously...
• Alice and Bob broadcast which basis they used for each qubit.
• Alice and Bob each delete all instances where they used different bases. This leaves them with a raw
key.
• Alice and Bob announce part of the raw key publicly and use this to obtain the error rate due to
eavesdropping by Eve. They can do this just by comparing the measurements of Bob with the qubit
sent by Alice.
The security of this protocol relies on the impossibility of cloning an unknown quantum state (Alice’s
sent qubit), the fact that measurements by Eve will change the qubit state so that Eve’s actions may be
detected, and the generation of a random choice of bases by Alice (think about how to ensure this). In
practice some additional steps are need to ensure an acceptable security. See Benenti et al., or Neilsen
and Chuang. The BB84 and related protocols are used experimentally with photon polarization as the
qubit states. See handout. Commercially available prototypes have also been recently developed, see
http://magiq.nowwireless.com/.
b0b1
Interpret
Transmit
Figure 1: Superdense coding works by first pre-communicating an EPR pair between sender (Alice, on left)
and receiver (Bob, on right). Alice first manipulates her half of this EPR pair (a single qubit) according to
which two classical bit message she wishes to transmit, and then sends her qubit to Bob. Bob then makes
some two qubit manipulations and finally measures both bits to obtain the two bits of classical information.
H bit 0
bit 1
Figure 2: To obtain the two bits of classical information this circuit is implemented by Bob on the two
qubits, one of which has been sent by Alice. Bob’s circuit is equivalent to making a measurement in the
Bell-basis.