QKD using entangled states

Here is another variant of the QKD protocol, due to Ekert [32], which

makes use of correlated quantum pairs as a resource shared between Alice

and Bob. For each key, Bob generates entangled photons and sends one to

Alice.

2

Locally each performs a measurement randomly, according to random

bit strings m

A

and m

B

respectively, in the or the H basis. These bit strings

2

It doesn’t matter who generates the pair. It could also be generated by a third party

and sent to both of them. The quantum channel is used for this purpose.

Information and Communication 193

are shared over a public channel, and Alice and Bob compare them to see

which bits match. The measured values of those bit positions are retained as

the shared key.

The point is that when m

A

and m

B

match, the measurement results,

though random, are perfectly correlated, while when they don’t match, Alice

and Bob get the same result only 50% of the time.

The drawback of this scheme is that Alice and Bob would have to verify

that their photons retained their entanglement when the key was being gen-

erated. To do this, they would have to perform an additional exercise of, say

making sure Bell’s inequality was violated. (For instance, each of them could

measure their photons in three different bases and share the values.)

Example 9.4.3. An example of the entangled QKD scheme: suppose Alice

and Bob share a huge supply of qubits in the state |β

00

i.

Index 1 2 3 4 5 6 7 8 9 10 11 12

m

A

0 1 0 1 0 0 0 1 1 1 0 0

m

B

1 1 1 0 1 0 1 0 0 0 1 0

K 0 0 1

The presence of an eavesdropper Eve is detected the same way as for the

BB84 scheme. The list of possible secure key-distribution schemes is quite

long, and you are invited to contribute to it!

9.5 Information Reconciliation and Privacy Amplifica-

tion

The sifting procedure in QKD protocols is to ensure the degree of security

of the channel. The presence of an eavesdropper is detected by errors above

a certain tolerance margin, say 20%. However, natural errors in the channel

could also cause discrepancies in the shared key. To remove these, and to

ensure further security on the shared key, two classical procedures known as

information reconciliation (a form of error correction) and privacy amplifica-

tion are carried out.

The basic idea of information reconciliation is to perform a parity check on

a subset of the key, compare, and correct. At the two-bit level, parity is just

an XOR. So Alice could randomly select two bits out of k

A

, announce their

positions and XOR to Bob. He then compares the parity of the same bits in

k

B

. If they do not match these bits are discarded. If they do then they decide

194 Introduction to Quantum Physics and Information Processing

to discard the second bit. This ensures that Eve does not learn anything more

about their key from their discussion.

The more sophisticated version generalizes this process, as first described

in 1992 by Bennett et al. [8]. They proceed in several iterations of essentially

the same process, but first dividing their keys into predetermined blocks and

checking the parity of the block. If the parity doesn’t match then they re-

cursively bisect their blocks to detect the location of the error and discard

it. To ensure that Eve doesn’t learn anything more from their parity discus-

sions (which happen in public), they discard the last bit of each block whose

parity is disclosed. This process is repeated many times with increasing block

sizes, until eventually the two keys are ensured to be reconciled with a large

probability.

At the end of information reconciliation, Alice and Bob have identical

keys but whose privacy has been compromised by all the public discussions.

To undo this effect, they resort to privacy amplification. To do this they select

something called a universal hash function to encode their strings. There are

many such functions that provide various bounds for the amount of informa-

tion Eve can gain. One such is to select random subsets of their strings and

to retain their parity bits for a new key.

In any case, both these steps amount to classical error correction and

coding, and will not be dealt with at greater depth in this book.

It is clear from this discussion that depending on the degree of privacy

they choose to have, the initial string length must be fairly large, of the order

of 4 times the length of the desired key.

Problems

9.1. How would the teleportation protocol change if the entangled state shared

by Alice and Bob was any of the other Bell states: |β

01

i, |β

10

i, or |β

11

i?

9.2. Consider the teleportation protocol, and suppose that the unknown qubit

with Alice is entangled with another qubit in the possession of a third party,

Charlie. Show how the protocol teleports the entanglement as well, i.e., at

the end of the protocol, Bob’s qubit is entangled with Charlie’s.

9.3. Formulate the matrix equivalent of the dense coding protocol and show that

it is unitary.

9.4. Analyzing the BB84 more thoroughly, consider that Eve measures every

photon sent by Alice, in the or H basis according to a random string m

e

.

Problems 195

Suppose Alice and Bob now announce m bits out of their shared set. What

is the probability that no error will be found? What fraction of Eve’s bits

would match with Alice’s and Bob’s? Would the public discussion between

Alice and Bob help Eve at all?

9.5. At one point in history, it was suggested that Eve might benefit by measuring

in a basis intermediate between the and H:

|0

e

i = cos

π

8

|0i + sin

π

8

|1i (9.10)

|1

e

i = sin

π

8

|0i − cos

π

8

|1i (9.11)

What is the probability that any one measurement by Eve gives the correct

result? If she prepares and then transmits photons in this basis to Bob, what

is the probability that Bob’s string has an error?

9.6. Suppose Alice prepares two qubits in the entangled state

1

2

[|01i − |10i]

and sends one qubit to Bob. Suppose that Eve intercepts and measures

that qubit, and then based on the outcome, prepares and sends a photon

to Bob. What can you say about the correlation between the qubits with

Alice and Bob


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *