Admin
Quantum Crypto
Honest parties
Adversaries
Classical crypto | Post-Quantum Crypto |
Uninteresting? | Fully Quantum Crypto
|
Classical
Classical
Quantum
Quantum
Fully Quantum Crypto
Fully quantum crypto
Quantum key distribution
Quantum key distribution
Classical key distribution
Classical key distribution
Authenticated classical channel
Eavesdropper
Classical key distribution
If the adversary has unlimited computational power, since they see all the communication between Alice and Bob, they can “reverse engineer” the most likely secret key agreed upon between Alice and Bob.
Classical key distribution is only secure using computational assumptions (e.g. the adversary cannot factor large integers or solve lattice problems).
Quantum key distribution
Quantum key distribution
Authenticated classical channel
Active eavesdropper
Insecure quantum channel
Quantum key distribution
This goal is possible! First shown by Bennett and Brassard in 1984, who came up with a protocol (known as BB84 protocol).
They show that secure key distribution is possible only assuming that
In particular, adversary can have unlimited computational power!
Wiesner Conjugate Coding
Standard basis (S):
Diagonal basis (D):
Single qubit example
Single qubit example
Single qubit example
Single qubit example
Single qubit example
Single qubit example
Single qubit example
Quantum key distribution
High level idea: Alice can send Bob many BB84 states.
Adversary does not know in advance which qubits will be “traps”, so if it decides to tamper many of them, it will be caught with high probability.
Quantum key distribution
Authenticated classical channel
Quantum key distribution
Authenticated classical channel
Quantum key distribution
Authenticated classical channel
Quantum key distribution
Authenticated classical channel
1. Bob picks random basis sequence: DDDSDSDDSDSDSDSD….
2. Measures his received qubits according to basis sequence
Bob’s raw key: 111101000101010010101
3. Bob calls Alice over the phone and they compare their �random basis sequence, and discard the bits where �they don’t match.
4. Error detection: Alice and Bob sample a few locations and check that�their raw keys match in those locations. If too many differences�occurred, abort.��5. Otherwise, use privacy amplification to distill a shared secret key.
Quantum key distribution
Authenticated classical channel
Why is this secure?
Quantum Money
Quantum money
Quantum money
Giant Database of Banknotes:
Serial # (s) Basis Sequence (bs) Key (ks)
0000000 SDSDDSDSDDSDS 0100010101001
0000001 DDDSDSSSDDDSS 1110101101010
0000002 SDDDSDSDSDDSD 1010101010100
.
.
.
Quantum money
Quantum money
Quantum money
Historical note
Next time
Ask me anything!
(about quantum)