SlideShare a Scribd company logo
Intro.   Cont. Var.       Information Theory    CVQKD   XP   Next




                       Continuous Variable
                      Quantum Cryptography
         Towards High Speed Quantum Cryptography


                          Frédéric Grosshans




                            CNRS / ENS Cachan




                  Palacký University, Olomouc, 2011
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.         Cont. Var.   Information Theory   CVQKD   XP   Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
Intro.         Cont. Var.   Information Theory   CVQKD   XP        Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
                              through a channel observed by Eve.
Intro.         Cont. Var.   Information Theory   CVQKD   XP        Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
                              through a channel observed by Eve.




         She encrypts the message with a secret key
Intro.         Cont. Var.   Information Theory   CVQKD   XP        Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
                              through a channel observed by Eve.




         She encrypts the message with a secret key
                                         as long as the message.
Intro.         Cont. Var.   Information Theory   CVQKD   XP   Next




Quantum Key Distribution

         Alice sends quantum objects to Bob
Intro.         Cont. Var.     Information Theory   CVQKD   XP   Next




Quantum Key Distribution

         Alice sends quantum objects to Bob




         Eve’s Measurenents
Intro.         Cont. Var.   Information Theory   CVQKD   XP      Next




Quantum Key Distribution

         Alice sends quantum objects to Bob




         Eve’s Measurenents ⇒ measurable perturbations
                                       ⇒ secret key generation
Intro.         Cont. Var.    Information Theory   CVQKD   XP   Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s)
Intro.         Cont. Var.    Information Theory   CVQKD   XP       Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
Intro.         Cont. Var.    Information Theory   CVQKD   XP       Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
Intro.         Cont. Var.     Information Theory   CVQKD   XP      Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
                 1 CD / year = 180 bits/s
Intro.         Cont. Var.     Information Theory     CVQKD   XP    Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
                 1 CD / year = 180 bits/s
                 1 iPod (160 GB)/ year = 40 kbit/s
Intro.         Cont. Var.     Information Theory     CVQKD   XP    Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
                 1 CD / year = 180 bits/s
                 1 iPod (160 GB)/ year = 40 kbit/s
            But the data has to stay here
Intro.     Cont. Var.   Information Theory   CVQKD   XP   Next




. . . and Continuous Variable

         Medium Range :∼ 25 km
         Medium Rate :∼ a few kbit/s
Intro.     Cont. Var.   Information Theory   CVQKD   XP   Next




. . . and Continuous Variable

         Medium Range :∼ 25 km
         Medium Rate :∼ a few kbit/s
         Much less mature
Intro.     Cont. Var.   Information Theory   CVQKD      XP   Next




. . . and Continuous Variable

         Medium Range :∼ 25 km ; 80 km soon ?
         Medium Rate :∼ a few kbit/s ; Mbits/s soon ?
         Much less mature ⇒ Much room for improvements
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.       Cont. Var.     Information Theory   CVQKD   XP   Next




Field quadratures

    Classical field
    Electromagnetic field
    described by QA and PA
    E(t) = QA cos ωt + PA sin ωt
Intro.       Cont. Var.     Information Theory   CVQKD   XP   Next




Field quadratures

    Classical field
    Electromagnetic field
    described by QA and PA
    E(t) = QA cos ωt + PA sin ωt

    Quantum description
    Q and P do not commute:
                       [Q, P] ∝ i .
    Add a
               “quantum noise”:
      Q = QA + BQ et P = PA + BP
    Heisenberg =⇒ ∆BQ ∆BP ≥ 1
Intro.   Cont. Var.   Information Theory         CVQKD          XP            Next




Homodyne Detection : Theory


                        Photocurrents:

                              i± ∝ (Eosc. (t) ± Esignal (t))2
                                    ∝ Eosc. (t)2 ± 2Eosc. (t)Esignal (t)

                         after substraction:

                         δi ∝ Eosc. (t)Esignal (t)
                               ∝      Eosc. (Qsignal cos ϕ + Psignal sin ϕ)
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.         Cont. Var.   Information Theory   CVQKD   XP       Next




XXth century CVQKD


         At the end of XXth century it was obvious that a
         generalization of QKD to continuous variables could be
         interesting.
         Problem : discrete bits continuous variable
Intro.         Cont. Var.   Information Theory   CVQKD   XP       Next




XXth century CVQKD


         At the end of XXth century it was obvious that a
         generalization of QKD to continuous variables could be
         interesting.
         Problem : discrete bits continuous variable



    Adapting BB84?
    Mark Hillery, “Quantum Cryptography with
    Squeezed States”,
    arXiv:quant-ph/9909006/PRA 61 022309
Intro.         Cont. Var.   Information Theory   CVQKD   XP       Next




XXth century CVQKD


         At the end of XXth century it was obvious that a
         generalization of QKD to continuous variables could be
         interesting.
         Problem : discrete bits continuous variable


    Natural modulation + information theory!
    Nicolas J. Cerf, Marc Lévy, Gilles Van
    Assche : “Quantum distribution of Gaussian
    keys using squeezed states”,
    arXiv:quant-ph/0008058/PRL 63 052311
Intro.         Cont. Var.   Information Theory   CVQKD     XP   Next




Where are the bits ?



         Quite frequent discussion with discrete quantum
         cryptographers :
             DQC : How do you encode a 0 or a 1 in CVQKD?
               Me : I don’t care, C. E. Shannon tells me
                    “∀ε > 0, ∃ code of rate I − ε.”
Intro.         Cont. Var.   Information Theory   CVQKD     XP       Next




Where are the bits ?


         Quite frequent discussion with discrete quantum
         cryptographers :
             DQC : How do you encode a 0 or a 1 in CVQKD?
               Me : Gilles/Jérôme/Anthony/Sébastien developed
                    a really efficient code, using sliced
                    reconciliation/LDPC matrices/R8 rotations and
                    octonions. Only he knows how it works.
Intro.         Cont. Var.   Information Theory   CVQKD     XP       Next




Where are the bits ?


         Quite frequent discussion with discrete quantum
         cryptographers :
             DQC : How do you encode a 0 or a 1 in CVQKD?
               Me : Gilles/Jérôme/Anthony/Sébastien developed
                    a really efficient code, using sliced
                    reconciliation/LDPC matrices/R8 rotations and
                    octonions. Only he knows how it works.

         Computation of the ideal code performance is easy !
Intro.         Cont. Var.    Information Theory   CVQKD   XP   Next




They’re hidden
         Availaible informationin a continuous signal
Intro.          Cont. Var.       Information Theory   CVQKD   XP   Next




They’re hidden
         Availaible informationin a continuous signal




    Differential entropy

         H(X) = −      P(x) dx log P(x) dx
           dx P(x) log P(x) − log dx

              H(X)             constante
Intro.          Cont. Var.       Information Theory         CVQKD       XP         Next




They’re hidden
         Availaible informationin a continuous signal
                                                                    with noise ?




    Differential entropy

         H(X) = −      P(x) dx log P(x) dx            H(X) = log ∆X + constante
           dx P(x) log P(x) − log dx

              H(X)             constante
Intro.          Cont. Var.       Information Theory          CVQKD             XP          Next




They’re hidden
         Availaible informationin a continuous signal
                                                                            with noise ?




    Differential entropy                              Mutual information
                                                      I(X : Y) = H(Y) − H(Y|X)
         H(X) = −      P(x) dx log P(x) dx
                                                             = H(Y) − H(Y|X)
           dx P(x) log P(x) − log dx
                                                                            ∆Y2
                                                             =   1
                                                                     log
              H(X)             constante                         2
                                                                           ∆Y2 |X
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.          Cont. Var.      Information Theory   CVQKD   XP   Next




The spy’s power



         Heisenberg :
              ∆BEve ∆BBob ≥ 1
Intro.          Cont. Var.      Information Theory   CVQKD   XP   Next




The spy’s power



         Heisenberg :
              ∆BEve ∆BBob ≥ 1




         ⇒ ∆BBob gives           IEve
                                 IBob
Intro.         Cont. Var.    Information Theory   CVQKD      XP         Next




Quantum Key Distribution Protocols

         Channel Evauation                            (noise measure)
         Alice&Bob evaluate IEve
Intro.         Cont. Var.    Information Theory   CVQKD       XP          Next




Quantum Key Distribution Protocols

         Channel Evauation                            (noise measure)
         Alice&Bob evaluate IEve


         Reconciliation                              (error correction)
         Alice&Bob share IBob identical bits.
                Ève knows IEve .
Intro.         Cont. Var.    Information Theory   CVQKD         XP          Next




Quantum Key Distribution Protocols

         Channel Evauation                              (noise measure)
         Alice&Bob evaluate IEve


         Reconciliation                                (error correction)
         Alice&Bob share IBob identical bits.
                Ève knows IEve .


         Privacy Amplification
         Alice&Bob share IBob − IEve identical bits.
                Ève knows ∼ 0.
Intro.         Cont. Var.   Information Theory   CVQKD   XP    Next




Theoretical Progresses in the last 10 years

         We went from a protocol
            using squeezed states,
            insecure beyond 50% losses (15 km),
            proved secure against Gaussian individual attack
Intro.         Cont. Var.   Information Theory   CVQKD   XP     Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
Intro.         Cont. Var.   Information Theory   CVQKD   XP     Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
             with no fundamental range limit
             proved secure against collective attacks
Intro.         Cont. Var.    Information Theory   CVQKD   XP    Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
             with no fundamental range limit
             proved secure against collective attacks
             likely secure against coherent attacks
Intro.         Cont. Var.    Information Theory   CVQKD   XP    Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
             with no fundamental range limit
             proved secure against collective attacks
             likely secure against coherent attacks
             and experimentally working
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.         Cont. Var.    Information Theory   CVQKD     XP   Next




1st generation demonstrator
F. Grosshans et. al., Nature (2003) & Brevet US




         m

         Key rate           75 kbit/s 3.1 dB (51%) losses
                            1.7 Mbit/s without losses
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integrated system
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integrated system
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integrated system
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Key-Rates
Intro.              Cont. Var.          Information Theory                          CVQKD        XP        Next




Key-Rates


                                                          SECOQC Performance
         100 kb/s
                                                               (2008)

                                                                L
                                                           Exce osses o
                                                                ss n      n
                                                       95%           oise ly
                                                           effi
                                       90

                                                               cie
                                         %

                                                                  nt c
                                             eff

                                                                       ode
                                                ici

          10 kb/s                     Slo
                                                    en
                                                       t

                                         w
                                                        co

                                             co
                                                          de

                                                  de




           1 kb/s
                    0k




                                 10




                                                        20




                                                                           30




                                                                                            40




                                                                                                      50
                                 km




                                                          km




                                                                               km




                                                                                            km




                                                                                                      km
                    m
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Key-Rates
Intro.                 Cont. Var.                        Information Theory                          CVQKD             XP        Next




Key-Rates


                                                                           SECOQC Performance
         100 kb/s
                                                                                (2008)

                                                                                 L
                                                                            Exce osses o
                                                                                 ss n      n
                                                                        95%           oise ly
                    Increases modulation rate :




                                                                            effi
                                                        90

                                                                                cie
                       ×10 easy, ×100 doable




                                                          %

                                                                                   nt c
                                                              eff

                                                                                        ode
                                                                 ici

          10 kb/s                                      Slo
                                                                     en
                                                                        t

                                                          w
                                                                         co

                                                              co
                                                                           de

                                                                   de                              use modern codes :
                                                                                                ocotonion based protocol
                                                                         us




                                                                                                +multi-edge LDPC codes
                                                                           eG




                                                                                                   + repetition codes
                                                                              PU
                                                                                s




           1 kb/s
                    0k




                                                  10




                                                                         20




                                                                                            30




                                                                                                              40




                                                                                                                            50
                                                  km




                                                                           km




                                                                                                km




                                                                                                               km




                                                                                                                            km
                          m
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integration with classical cryptography
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integration with classical cryptography
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.      Cont. Var.     Information Theory   CVQKD   XP     Next




Open Problems




         Finite size effects
         Link with post-selection based protocols (.de, .au)
         Side-channels and quantum hacking
         Other cryptographic applications

More Related Content

What's hot (20)

Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Mohammad Ghorbani
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
Bise Mond
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Priya Winsome
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
Introduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information TheoryIntroduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information Theory
Rahul Mee
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Rupesh Sharma
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
AntonChirayil
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the ppt
Mrinal Mondal
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Himanshu Shekhar
 
Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1
Arunabha Saha
 
Basic Optical Fiber Working
Basic Optical Fiber WorkingBasic Optical Fiber Working
Basic Optical Fiber Working
mahipal9
 
Optical fiber communication
Optical fiber          communicationOptical fiber          communication
Optical fiber communication
anitha bolleddu
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Melanie Swan
 
VoWifi 02 - VoWifi architecture overview (pdf ppt)
VoWifi 02 - VoWifi architecture overview (pdf ppt)VoWifi 02 - VoWifi architecture overview (pdf ppt)
VoWifi 02 - VoWifi architecture overview (pdf ppt)
Vikas Shokeen
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
Bise Mond
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Priya Winsome
 
Introduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information TheoryIntroduction to Quantum Computing & Quantum Information Theory
Introduction to Quantum Computing & Quantum Information Theory
Rahul Mee
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Rupesh Sharma
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the ppt
Mrinal Mondal
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1
Arunabha Saha
 
Basic Optical Fiber Working
Basic Optical Fiber WorkingBasic Optical Fiber Working
Basic Optical Fiber Working
mahipal9
 
Optical fiber communication
Optical fiber          communicationOptical fiber          communication
Optical fiber communication
anitha bolleddu
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Melanie Swan
 
VoWifi 02 - VoWifi architecture overview (pdf ppt)
VoWifi 02 - VoWifi architecture overview (pdf ppt)VoWifi 02 - VoWifi architecture overview (pdf ppt)
VoWifi 02 - VoWifi architecture overview (pdf ppt)
Vikas Shokeen
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 

Similar to Continuous variables quantum cryptography (20)

The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
XequeMateShannon
 
Report_amit
Report_amitReport_amit
Report_amit
Amit Kumar Mohapatra
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET Journal
 
Security of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacksSecurity of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacks
wtyru1989
 
Quantum key distribution with continuous variables at telecom wavelength
Quantum key distribution with continuous variables at telecom wavelengthQuantum key distribution with continuous variables at telecom wavelength
Quantum key distribution with continuous variables at telecom wavelength
wtyru1989
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...
wtyru1989
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
tabrej
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
ganeshkarthick
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
IJNSA Journal
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
IRJET Journal
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
Shahzad Ahmad
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Prasanna Venkatesan
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
Information Security Awareness Group
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
ambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
ambainishhm666bbbnnvcddffghnmjkkm2002-1.pptambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
ambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
vishnukv766
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sreekanth Narendran
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
XequeMateShannon
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET Journal
 
Security of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacksSecurity of continuous variable quantum key distribution against general attacks
Security of continuous variable quantum key distribution against general attacks
wtyru1989
 
Quantum key distribution with continuous variables at telecom wavelength
Quantum key distribution with continuous variables at telecom wavelengthQuantum key distribution with continuous variables at telecom wavelength
Quantum key distribution with continuous variables at telecom wavelength
wtyru1989
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...Continuous variable quantum key distribution finite key analysis of composabl...
Continuous variable quantum key distribution finite key analysis of composabl...
wtyru1989
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
tabrej
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
IJNSA Journal
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
IRJET Journal
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
Shahzad Ahmad
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
ambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
ambainishhm666bbbnnvcddffghnmjkkm2002-1.pptambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
ambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
vishnukv766
 
Ad

More from wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
wtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
wtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
wtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
wtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
wtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
wtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
wtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
wtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
wtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
wtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
wtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
wtyru1989
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
wtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
wtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
wtyru1989
 
Em method
Em methodEm method
Em method
wtyru1989
 
标量量化
标量量化标量量化
标量量化
wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
wtyru1989
 
Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
wtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
wtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
wtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
wtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
wtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
wtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
wtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
wtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
wtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
wtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
wtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
wtyru1989
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
wtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
wtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
wtyru1989
 
标量量化
标量量化标量量化
标量量化
wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
wtyru1989
 
Ad

Recently uploaded (20)

End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
 
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Scott M. Graffius
 
Dancing with AI - A Developer's Journey.pptx
Dancing with AI - A Developer's Journey.pptxDancing with AI - A Developer's Journey.pptx
Dancing with AI - A Developer's Journey.pptx
Elliott Richmond
 
Trends Report: Artificial Intelligence (AI)
Trends Report: Artificial Intelligence (AI)Trends Report: Artificial Intelligence (AI)
Trends Report: Artificial Intelligence (AI)
Brian Ahier
 
6th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 20256th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 2025
DanBrown980551
 
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
Edge AI and Vision Alliance
 
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
 
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
 
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfHow Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
 
Top 25 AI Coding Agents for Vibe Coders to Use in 2025.pdf
Top 25 AI Coding Agents for Vibe Coders to Use in 2025.pdfTop 25 AI Coding Agents for Vibe Coders to Use in 2025.pdf
Top 25 AI Coding Agents for Vibe Coders to Use in 2025.pdf
SOFTTECHHUB
 
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
 
TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
 
Trends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary MeekerTrends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary Meeker
Clive Dickens
 
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMEstablish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to KnowWhat is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
SMACT Works
 
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
 
Extend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptxExtend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptx
hoang971
 
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and ImplementationAI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
Christine Shepherd
 
Jira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : IntroductionJira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : Introduction
Ravi Teja
 
Domino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use CasesDomino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use Cases
panagenda
 
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
 
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Mark Zuckerberg teams up with frenemy Palmer Luckey to shape the future of XR...
Scott M. Graffius
 
Dancing with AI - A Developer's Journey.pptx
Dancing with AI - A Developer's Journey.pptxDancing with AI - A Developer's Journey.pptx
Dancing with AI - A Developer's Journey.pptx
Elliott Richmond
 
Trends Report: Artificial Intelligence (AI)
Trends Report: Artificial Intelligence (AI)Trends Report: Artificial Intelligence (AI)
Trends Report: Artificial Intelligence (AI)
Brian Ahier
 
6th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 20256th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 2025
DanBrown980551
 
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
Edge AI and Vision Alliance
 
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
 
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto CertificateCybersecurity Fundamentals: Apprentice - Palo Alto Certificate
Cybersecurity Fundamentals: Apprentice - Palo Alto Certificate
VICTOR MAESTRE RAMIREZ
 
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfHow Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
 
Top 25 AI Coding Agents for Vibe Coders to Use in 2025.pdf
Top 25 AI Coding Agents for Vibe Coders to Use in 2025.pdfTop 25 AI Coding Agents for Vibe Coders to Use in 2025.pdf
Top 25 AI Coding Agents for Vibe Coders to Use in 2025.pdf
SOFTTECHHUB
 
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
 
TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025TimeSeries Machine Learning - PyData London 2025
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
 
Trends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary MeekerTrends Artificial Intelligence - Mary Meeker
Trends Artificial Intelligence - Mary Meeker
Clive Dickens
 
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOMEstablish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to KnowWhat is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
SMACT Works
 
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
 
Extend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptxExtend-Microsoft365-with-Copilot-agents.pptx
Extend-Microsoft365-with-Copilot-agents.pptx
hoang971
 
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and ImplementationAI Agents in Logistics and Supply Chain Applications Benefits and Implementation
AI Agents in Logistics and Supply Chain Applications Benefits and Implementation
Christine Shepherd
 
Jira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : IntroductionJira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : Introduction
Ravi Teja
 
Domino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use CasesDomino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use Cases
panagenda
 

Continuous variables quantum cryptography

  • 1. Intro. Cont. Var. Information Theory CVQKD XP Next Continuous Variable Quantum Cryptography Towards High Speed Quantum Cryptography Frédéric Grosshans CNRS / ENS Cachan Palacký University, Olomouc, 2011
  • 2. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 3. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob
  • 4. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob through a channel observed by Eve.
  • 5. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob through a channel observed by Eve. She encrypts the message with a secret key
  • 6. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob through a channel observed by Eve. She encrypts the message with a secret key as long as the message.
  • 7. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Alice sends quantum objects to Bob
  • 8. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Alice sends quantum objects to Bob Eve’s Measurenents
  • 9. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Alice sends quantum objects to Bob Eve’s Measurenents ⇒ measurable perturbations ⇒ secret key generation
  • 10. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s)
  • 11. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run
  • 12. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate :
  • 13. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate : 1 CD / year = 180 bits/s
  • 14. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate : 1 CD / year = 180 bits/s 1 iPod (160 GB)/ year = 40 kbit/s
  • 15. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate : 1 CD / year = 180 bits/s 1 iPod (160 GB)/ year = 40 kbit/s But the data has to stay here
  • 16. Intro. Cont. Var. Information Theory CVQKD XP Next . . . and Continuous Variable Medium Range :∼ 25 km Medium Rate :∼ a few kbit/s
  • 17. Intro. Cont. Var. Information Theory CVQKD XP Next . . . and Continuous Variable Medium Range :∼ 25 km Medium Rate :∼ a few kbit/s Much less mature
  • 18. Intro. Cont. Var. Information Theory CVQKD XP Next . . . and Continuous Variable Medium Range :∼ 25 km ; 80 km soon ? Medium Rate :∼ a few kbit/s ; Mbits/s soon ? Much less mature ⇒ Much room for improvements
  • 19. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 20. Intro. Cont. Var. Information Theory CVQKD XP Next Field quadratures Classical field Electromagnetic field described by QA and PA E(t) = QA cos ωt + PA sin ωt
  • 21. Intro. Cont. Var. Information Theory CVQKD XP Next Field quadratures Classical field Electromagnetic field described by QA and PA E(t) = QA cos ωt + PA sin ωt Quantum description Q and P do not commute: [Q, P] ∝ i . Add a “quantum noise”: Q = QA + BQ et P = PA + BP Heisenberg =⇒ ∆BQ ∆BP ≥ 1
  • 22. Intro. Cont. Var. Information Theory CVQKD XP Next Homodyne Detection : Theory Photocurrents: i± ∝ (Eosc. (t) ± Esignal (t))2 ∝ Eosc. (t)2 ± 2Eosc. (t)Esignal (t) after substraction: δi ∝ Eosc. (t)Esignal (t) ∝ Eosc. (Qsignal cos ϕ + Psignal sin ϕ)
  • 23. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 24. Intro. Cont. Var. Information Theory CVQKD XP Next XXth century CVQKD At the end of XXth century it was obvious that a generalization of QKD to continuous variables could be interesting. Problem : discrete bits continuous variable
  • 25. Intro. Cont. Var. Information Theory CVQKD XP Next XXth century CVQKD At the end of XXth century it was obvious that a generalization of QKD to continuous variables could be interesting. Problem : discrete bits continuous variable Adapting BB84? Mark Hillery, “Quantum Cryptography with Squeezed States”, arXiv:quant-ph/9909006/PRA 61 022309
  • 26. Intro. Cont. Var. Information Theory CVQKD XP Next XXth century CVQKD At the end of XXth century it was obvious that a generalization of QKD to continuous variables could be interesting. Problem : discrete bits continuous variable Natural modulation + information theory! Nicolas J. Cerf, Marc Lévy, Gilles Van Assche : “Quantum distribution of Gaussian keys using squeezed states”, arXiv:quant-ph/0008058/PRL 63 052311
  • 27. Intro. Cont. Var. Information Theory CVQKD XP Next Where are the bits ? Quite frequent discussion with discrete quantum cryptographers : DQC : How do you encode a 0 or a 1 in CVQKD? Me : I don’t care, C. E. Shannon tells me “∀ε > 0, ∃ code of rate I − ε.”
  • 28. Intro. Cont. Var. Information Theory CVQKD XP Next Where are the bits ? Quite frequent discussion with discrete quantum cryptographers : DQC : How do you encode a 0 or a 1 in CVQKD? Me : Gilles/Jérôme/Anthony/Sébastien developed a really efficient code, using sliced reconciliation/LDPC matrices/R8 rotations and octonions. Only he knows how it works.
  • 29. Intro. Cont. Var. Information Theory CVQKD XP Next Where are the bits ? Quite frequent discussion with discrete quantum cryptographers : DQC : How do you encode a 0 or a 1 in CVQKD? Me : Gilles/Jérôme/Anthony/Sébastien developed a really efficient code, using sliced reconciliation/LDPC matrices/R8 rotations and octonions. Only he knows how it works. Computation of the ideal code performance is easy !
  • 30. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal
  • 31. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal Differential entropy H(X) = − P(x) dx log P(x) dx dx P(x) log P(x) − log dx H(X) constante
  • 32. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal with noise ? Differential entropy H(X) = − P(x) dx log P(x) dx H(X) = log ∆X + constante dx P(x) log P(x) − log dx H(X) constante
  • 33. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal with noise ? Differential entropy Mutual information I(X : Y) = H(Y) − H(Y|X) H(X) = − P(x) dx log P(x) dx = H(Y) − H(Y|X) dx P(x) log P(x) − log dx ∆Y2 = 1 log H(X) constante 2 ∆Y2 |X
  • 34. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 35. Intro. Cont. Var. Information Theory CVQKD XP Next The spy’s power Heisenberg : ∆BEve ∆BBob ≥ 1
  • 36. Intro. Cont. Var. Information Theory CVQKD XP Next The spy’s power Heisenberg : ∆BEve ∆BBob ≥ 1 ⇒ ∆BBob gives IEve IBob
  • 37. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Protocols Channel Evauation (noise measure) Alice&Bob evaluate IEve
  • 38. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Protocols Channel Evauation (noise measure) Alice&Bob evaluate IEve Reconciliation (error correction) Alice&Bob share IBob identical bits. Ève knows IEve .
  • 39. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Protocols Channel Evauation (noise measure) Alice&Bob evaluate IEve Reconciliation (error correction) Alice&Bob share IBob identical bits. Ève knows IEve . Privacy Amplification Alice&Bob share IBob − IEve identical bits. Ève knows ∼ 0.
  • 40. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack
  • 41. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states
  • 42. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states with no fundamental range limit proved secure against collective attacks
  • 43. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states with no fundamental range limit proved secure against collective attacks likely secure against coherent attacks
  • 44. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states with no fundamental range limit proved secure against collective attacks likely secure against coherent attacks and experimentally working
  • 45. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 46. Intro. Cont. Var. Information Theory CVQKD XP Next 1st generation demonstrator F. Grosshans et. al., Nature (2003) & Brevet US m Key rate 75 kbit/s 3.1 dB (51%) losses 1.7 Mbit/s without losses
  • 47. Intro. Cont. Var. Information Theory CVQKD XP Next Integrated system
  • 48. Intro. Cont. Var. Information Theory CVQKD XP Next Integrated system
  • 49. Intro. Cont. Var. Information Theory CVQKD XP Next Integrated system
  • 50. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates
  • 51. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates SECOQC Performance 100 kb/s (2008) L Exce osses o ss n n 95% oise ly effi 90 cie % nt c eff ode ici 10 kb/s Slo en t w co co de de 1 kb/s 0k 10 20 30 40 50 km km km km km m
  • 52. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates
  • 53. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates SECOQC Performance 100 kb/s (2008) L Exce osses o ss n n 95% oise ly Increases modulation rate : effi 90 cie ×10 easy, ×100 doable % nt c eff ode ici 10 kb/s Slo en t w co co de de use modern codes : ocotonion based protocol us +multi-edge LDPC codes eG + repetition codes PU s 1 kb/s 0k 10 20 30 40 50 km km km km km m
  • 54. Intro. Cont. Var. Information Theory CVQKD XP Next Integration with classical cryptography
  • 55. Intro. Cont. Var. Information Theory CVQKD XP Next Integration with classical cryptography
  • 56. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 57. Intro. Cont. Var. Information Theory CVQKD XP Next Open Problems Finite size effects Link with post-selection based protocols (.de, .au) Side-channels and quantum hacking Other cryptographic applications