QC Chapter4
QC Chapter4
Quantum key distribution protocols are introduced here as the first appli-
cation of qubits to quantum information processing. Completely secure en-
cryption key can be shared by two parties (Alice and Bob) by making use of
quantum resources. This key is used for classical encryption afterward.
0 ⊕ 0 = 0, 0 ⊕ 1 = 1 ⊕ 0 = 1, 1 ⊕ 1 = 0.
89
90 QUANTUM COMPUTING
E : (a, k) 7→ c = a ⊕ k (4.1)
D : (c, k) 7→ a = c ⊕ k. (4.2)
It is possible to share the encryption key between Alice and Bob by using
qubits so that Eve’s attack can be detected with high precision. Such a scheme
is called a quantum key distribution, or QKD for short. There are several
QKD schemes, all of which make use of the fact that Eve’s eavesdropping is
a measurement of qubits and the qubit state is altered by this action.
QKD is the first practical application of quantum information in this book.
QKD devices are manufactured by several companies worldwide and already
commercially available [1, 2, 3, 4].
4.2 BB84
The first example of QKD has been proposed by Bennett and Brassard in 1984
and hence this protocol is called BB84 [5]. The sender Alice and the receiver
Bob can detect a possible third party Eve eavesdropping their communications
by comparing the sequence of qubits sent and received.
Figure 4.1 shows the BB84 setting, in which Alice sends a qubit-string to
Bob through a unidirectional quantum channel Q while they can communicate
through a bidirectional classical channel C, where both Q and C channels may
be eavesdropped by Eve.
To make our discussion concrete, suppose they employ polarized photons
as qubits. Let us define four polarized photon states |e0 ⟩ = | ↔⟩, |e1 ⟩ = | ↕
Quantum Key Distribution 91
FIGURE 4.1
Quantum key distribution protocol BB84. Q is a unidirectional quantum
channel while C is a bidirectional classical channel. Eve might intercepts
both channels.
√ √
⟩, |f0 ⟩ = | ⟩, |f1 ⟩ = | ⟩, where |f0 ⟩ = (|e0 ⟩+|e1 ⟩)/ 2, |f1 ⟩ = (|e0 ⟩−|e1 ⟩)/ 2.
↔
In optics, they are also knows as |e0 ⟩ = |H⟩, |e1 ⟩ = |V⟩, |f0 ⟩ = |D⟩, and
|f1 ⟩ = |X⟩. Alice encodes 0 and 1 with respect to two bases B1 = {|e0 ⟩, |e1 ⟩}
and B2 = {|f0 ⟩, |f1 ⟩} as
Basis B1 0 7→ |e0 ⟩, 1 7→ |e1 ⟩,
Basis B2 0 7→ |f0 ⟩, 1 7→ |f1 ⟩.
Step 1 Alice randomly chooses one of the four polarizations {|e0 ⟩, |e1 ⟩, |f0 ⟩, |f1 ⟩}
for each photon and sends a photon sequence |f1 ⟩, |e0 ⟩, |f0 ⟩, . . ., for ex-
ample, to Bob. Bob also chooses a basis B1 or B2 randomly and in-
dependently of Alice, to measure the polarization of each photon he
receives. 4N photons must be sent from Alice to Bob to generate a key
of bit-length N as will be shown below.
Step 2 After all photons have been sent, Alice and Bob exchange the sequence
of the bases B1 /B2 they employed using the classical communication
channel (so Eve might intercept their communication), without disclos-
ing the bits (0/1) Alice sent and Bob received. They will know, as a
result, for which photons they employed the same basis. They discard
all the cases where they employed different bases since the sent bits and
the received bits agree only with probability 1/2 in these cases. For
example, suppose Alice sent a photon |e0 ⟩ and Bob measures it with
B2 basis. Since the photon he receives is |e0 ⟩ = √12 (|f0 ⟩ + |f1 ⟩), his
measurement outcome is f0 or f1 both with probability 1/2. There are
∼ 2N cases that are discarded.
Step 3 Now ∼ 2N photons, on average, are correctly transmitted and they
share a bit-string of length ∼ 2N in their hands. To make sure that
92 QUANTUM COMPUTING
Alice’s basis B1 B2 B1 B2 B2 B1 B2 B1 B2 B2 B1 B1
Alice’s bit 0 1 0 0 1 1 0 1 0 0 1 0
Bob’s basis B1 B2 B2 B1 B2 B2 B1 B2 B1 B2 B2 B1
Bob bit 0 1 ? ? 1 ? ? ? ? 0 ? 0
where ? is randomly chosen from {0, 1}. Alice and Bob keep the sequence
0, 1, 1, 0, 0, . . . and discard the rest. Half of the kept sequence is exchanged to
check the security of the channel and the rest is used to generate a key.
Quantum Key Distribution 93
Suppose Eve eavesdrops their communication. Then their readings may, for
example, be
Alice’s basis B1 B2 B1 B2 B2 B1 B2 B1 B2 B2 B1 B1
Alice’s bit 0 1 0 0 1 1 0 1 0 0 1 0
Eve’s basis B1 B2 B1 B2 B1 B2 B1 B2 B1 B2 B1 B2
Eve’s bit 0 1 0 0 ? ? ? ? ? 0 1 ?
Bob’s basis B1 B2 B2 B1 B2 B2 B1 B2 B1 B2 B2 B1
Bob bit 0 1 ? ? ? ? ? ? ? 0 ? ?
The 5th and 12th bits Bob mesaures may not be the correct ones, even though
Alice and Bob employed the same basis.
4.3 B92
Bennett proposed a QKD protocol different from BB84 in 1992, which is now
called B92 [6]. BB84 employs four different polarizations for encoding, while
B92 employs two. The setting of B92 is essentially the same as that of BB84
depicted in Fig. 4.1 except that the classical channel can be unidirectional
from Bob to Alice.
Alice uses two types of photons for encoding as
0 7→ |e0 ⟩, 1 7→ |f0 ⟩.
Alice randomly chooses one of {|e0 ⟩, |f0 ⟩} for each photon and sends a pho-
ton sequence |f0 ⟩, |e1 ⟩, |f0 ⟩, |e0 ⟩, . . ., for example, to Bob. Bob chooses one of
measurement bases B1 = {|e0 ⟩, |e1 ⟩} and B2 = {|f0 ⟩, |f1 ⟩} randomly to mea-
sure each photon he receives. The following table shows the relation between
Alice’s photon state and Bob’s measurement outcome. The table also shows
the probability of each event to happen.
(|a⟩, |b⟩) (|e0 ⟩, |e0 ⟩) (|e0 ⟩, |e1 ⟩) (|e0 ⟩, |f0 ⟩) (|e0 ⟩, |f1 ⟩)
Prob. 1/4 0 1/8 1/8
(|a⟩, |b⟩) (|f0 ⟩, |e0 ⟩) (|f0 ⟩, |e1 ⟩) (|f0 ⟩, |f0 ⟩) (|f0 ⟩, |f1 ⟩)
Prob. 1/8 1/8 1/4 0
Here |a⟩ is the photon state Alice sends while |b⟩ is the photon state Bob
measures. Note that Bob measures |ek ⟩ if the basis B1 is employed while
|fk ⟩ if the basis B2 is employed. It is important to recognize that (i) if Bob
measures e1 , then Alice has definitely sent |f0 ⟩, while (ii) if he measures f1 ,
Alice has definitely sent |e0 ⟩. Bob can say nothing definite for other cases
with the measurement outcomes e0 and f0 .
94 QUANTUM COMPUTING
Step 1 Alice sends 8N photons to Bob. We show below that this is the necessary
number of photons to generate a key of bit-length N .
Step 2 Bob tells Alice over a public channel when he measured e0 and f0 . We
find from the above table that there are approximately 8N × 3/4 = 6N
such cases among 8N photons. They discard these cases and keep 2N
cases, for which Bob measured e1 or f1 .
Step 3 For these 2N cases, Alice assigns 0 to her e0 and 1 to her f0 , while Bob
assigns 0 to his f1 and 1 to his e1 . By these assignments, they should
share the same bit-string of the average length 2N . Note that Alice does
not send any classical information to Bob in this scheme.
Step 4 To check if Eve is in action, they randomly pick up N bits out of the
2N bits obtained in Step 3 and Bob sends these bits to Alice over a
public channel. They can use the remaining N bits for encryption key if
Alice confirms all N bits are the same as hers. Otherwise, they repeat
the same process with a different quantum channel until the security is
confirmed.
Let us analyze Eve’s action in more details. Suppose that Alice has sent the
ith state |ai ⟩ and Eve intercepted the transmission with the basis B1 or B2 . In
her measurements, Eve will have probability 1/2 of getting |ai ⟩, a probability
1/4 of getting a state in {|e0 ⟩, |f0 ⟩} \ {|ai ⟩}, and a probability 1/4 of getting
a state in {|e1 ⟩, |f1 ⟩}. If Eve measures |e1 ⟩ or |f1 ⟩, she knows for sure that
|ai ⟩ = |f0 ⟩ or |e0 ⟩, respectively. Then Eve should send Bob |ci ⟩ = |f0 ⟩ or |e0 ⟩,
respectively. In other cases, Eve should send Bob her measured state, which
is the best action she can take.
Let us estimate the fraction of the N bits sent to Alice, which indicates Eve’s
presence. Recall that these bits corresponds to Bob’s measurement outcomes
e1 , f1 . There are two cases that are impossible without eavesdropping, namely
(Alice, Bob) = (|e0 ⟩, |e1 ⟩) and (|f0 ⟩, |f1 ⟩). The first case takes place if Alice
sends |e0 ⟩ and Eve measures it with B2 basis and measure |f0 ⟩, which is sent
to Bob who measures it with B1 basis. Note that if Eve measures |f1 ⟩, she
will send Bob |e0 ⟩ and Bob will definitely measure |e0 ⟩. The probability Alice
chooses |e0 ⟩ is 1/2, the probability Eve chooses B2 and measure f0 is 1/4,
while the probability Bob chooses B1 and measure e1 is 1/4, which results
in overall probability of 1/32. Obviously the probability of the second case
(Alice, Bob) = (|f0 ⟩, |f1 ⟩) is also 1/32. Therefore, if N bits are sent from Bob
to Alice, she finds approximately N/16 bits do not match with hers.
These cases should be compared with the following experiment. Suppose
one places a polarization plate that polarizes an unpolarized light to horizon-
tal direction. The second plate polarizes light vertically. If the second plate
is placed after the first, there should be not light passing through them. This
corresponds to the case |e0 ⟩ ↛ |e1 ⟩ and |f0 ⟩ ↛ |f1 ⟩. If the third polarization
plate making angle π/4 to the horizontal line is inserted between the first
Quantum Key Distribution 95
FIGURE 4.2
Probability distribution of Bob’s measurement outcomes when Eve is in ac-
tion. The fractional number attached to each line corresponds to the branch-
ing probability while the state shows the projected state after measurement.
When Eve measures f1 (e1 ), she replaces it by |e0 ⟩ (|f0 ⟩), respectively, and
send it to Bob. The bold line denotes the case by which Alice can detect an
eavesdropper.
96 QUANTUM COMPUTING
and the second plates, then 1/8 of the incoming light propagates through the
three plates. Eve’s measurement with B2 basis plays the rôle of the third po-
larization plate, which opens the channel that leads to forbidden propagation
(|e0 ⟩ → |e1 ⟩ above and | ↔⟩ → | ↕⟩ here) in both cases.
4.4 E91
BB84 and B92 use a string of single qubits. It is also possible to use entangled
pairs for QKD. Here we introduce a protocol, known as E91, which was
proposed by Ekert in 1991 [6]. Another protocol BBM92, also making use of
entanglement, will be introduced in the next section.
E91 is based on the very property of entanglement: It violates the Bell
inequality. The third party prepares an entangled state
1
|Ψ− ⟩ = √ (|e0 ⟩|e1 ⟩ − |e1 ⟩|e0 ⟩).
2
Then the first qubit is sent to Alice while the second to Bob. They share an
entangled state |Ψ− ⟩ if there are no eavesdroppers acting.
Suppose Eve intercepts a photon sent to Bob. She measures the qubit
with an arbitrary basis and sends Bob a photon in the state Eve mea-
sured. Suppose Eve used a basis {|ϵ0 ⟩ = (cos(θ/2), eiϕ sin(θ/2))t , |ϵ1 ⟩ =
(− sin(θ/2), eiϕ cos(θ/2))2 } for her measurement. Since |Ψ− ⟩ = √12 (|ϵ0 ⟩|ϵ1 ⟩ −
|ϵ1 ⟩|ϵ0 ⟩) up to unphysical overall phase for any θ and ϕ, the state after the
measurement is either |ϵ0 ⟩|ϵ1 ⟩ or |ϵ1 ⟩|ϵ0 ⟩. Note that both of them are ten-
sor product state and hence satisfies the Bell inequality. It is impossible to
eavesdrop the qubit sent to Bob without disentangling |Ψ− ⟩.
Step 1 A third party (it may be Alice as well) prepares 9N/2 entangled photon
pairs |Ψ− ⟩ and sends the first photons to Alice and the second photons
to Bob.
Step 2 Alice and Bob measure photons they possess one by one by choosing
one of the following bases independently and randomly;
Alice : veca1 , veca2 , veca3
(4.3)
Bob : vecb1 , vecb2 , vecb2 ,
which they used the common axis for measurement, namely those cor-
responding to (veca2 , vecb1 ) and (veca3 , vecb2 ) out of 9 combinations
{(vecaj , vecbk )}. There are approximately N such cases, for which Al-
ice’s and Bob’s measurement outcomes are anti-correlated; if Alice mea-
sures e0 , Bob will measure e1 and vice versa. The other 7 combinations
are used to detect eavesdroppers.
Step 4 Alice and Bob check the CHSH variant of the Bell’s inequality, see below.
The photons they keep could be disentangled by possible eavesdropping
if the inequality is satisfied, in which case they use other quantum chan-
nels until they confirm the security of the channels. Once they confirm
the security, they use the n bits corresponding to the common axis mea-
surements to generate a key of length N .
To examine the CHSH inequality, they use the following observables
σz − σx σz − σx
Q = σz ⊗ I2 , R = σx ⊗ I2 , S = −I2 ⊗ √ , T = I2 ⊗ √
2 2
and evaluate the expectation values E(QS), E(RS), E(RT ) and E(QT ) to
check the inequality
|E(QS) + E(RS) + E(RT ) − E(QT )| ≤ 2
is satisfied or not. If the state |Ψ− ⟩ is intact, they should have
1 σz + σx 1
E(QS) = ⟨Ψ− |QS|Ψ− ⟩ = − (0, 1, −1, 0) σz ⊗ √ (0, 1, −1, 0)t = √ .
2 2 2
Similarly they evaluate
1
E(RS) = E(RT ) = −E(QT ) = √ ,
2
from which they obtain
√
|E(QS) + E(RS) + E(RT ) − E(QT )| = 2 2 > 2.
If, on the other hand, the state they share is |Ξ⟩ = |e0 ⟩|e1 ⟩, for example,
because of eavesdropping, they have
1
⟨Ξ|QS|Ξ⟩ = −⟨Ξ|QT |Ξ⟩ = √ , ⟨Ξ|RS|Ξ⟩ = ⟨Ξ|RT |Ξ⟩ = 0,
2
from which they find the CHSH inequality is satisfied as
√
|E(QS) + E(RS) + E(RT ) − E(QT )| = 2 < 2.
BB84 and B92 employ a string of single qubit states. There can be a security
problem if a single photo source produces multiple photons, which allows for
eavesdropping without being recognized by Alice and Bob by stealing a part of
photons. It should be also noted that E91 protocol does not require random
number generators, which might lower the security of single-photon based
QKD. Note that randomness in E91 is built in Nature.
98 QUANTUM COMPUTING
4.5 BBM92
Bennett, Brassard and Mermin proposed a QKD protocol making use of en-
tangled states, which is now known as BBM92 [8]. This protocol is regarded
as a natural extension of BB84 to entangled states.
Suppose Alice generates many two-qubit states of the form
1
|Φ+ ⟩ = √ (|e0 ⟩|e0 ⟩ + |e1 ⟩|e1 ⟩)
2
and keeps the first qubits while the string of the second qubits is sent to Bob.
They measure qubits they possess one by one. They should share a common
bit-string such as 00101101 . . ., where e0 is mapped to 0 while e1 is mapped
to 1. Of course we know this protocol is too naı̈ve. Eve may intercepts
qubits sent to Bob and measure them with B1 = {|e0 ⟩, |e1 ⟩} basis and sends
the result to Bob. Then Alice, Bob and Eve share the same bit-string and
confidentiality will be lost.
To overcome this problem, we employ the same strategy as that of BB84
and B92; we introduce two measurement bases B1 and B2 = {|f0 ⟩, |f1 ⟩}. Let
us note that |Φ+ ⟩ is also written as
1
|Φ+ ⟩ = √ (|f0 ⟩|f0 ⟩ + |f1 ⟩|f1 ⟩).
2
If both Alice and Bob employ the measurement basis B1 , they will obtain
the identical outcome e0 or e1 while if both of them employ the measurement
basis B2 , they will obtain identical outcome f0 or f1 . If they employ different
measurement bases, their measurement outcomes are random. For example,
if Alice employs B1 basis while Bob employs B2 basis and Alice obtains e0 ,
Bob’s outcome will be f0 or f1 both with probability 1/2.
Step 3 They exchange the measurement bases they employed upon each mea-
surement over a classical channel while keeping the measurement out-
comes secret.
Step 4 They discard the ∼ 2N cases, for which they employed different mea-
surement bases, while keeping ∼ 2N measurement outcomes with the
same measurement bases. They assign 0 to e0 and f0 and 1 to |e1 and
f1 to generate a one-time pad key of bit-length ∼ 2N .
Quantum Key Distribution 99
Alice’s basis B1 B2 B1 B1 B2 B2 B1 B2
Alice’s outcome e0 f1 e0 e1 f0 f0 e1 f1
Bob’s basis B2 B2 B1 B2 B1 B2 B1 B1
Bob’s outcome f0 f1 e0 f1 e1 f0 e1 e0
Code generated 1 0 0 1
Eve’s basis B2 B1 B2 B2 B2 B1 B1 B2
Eve’s outcome f0 e0 f1 f0 f1 e0 e1 f1
Alice’s basis B1 B2 B1 B1 B2 B2 B1 B2
Alice’s outcome ? ? ? ? f1 ? e1 f1
Bob’s basis B2 B2 B1 B2 B1 B2 B1 B1
Bob’s outcome f0 ? ? f0 ? ? e1 ?
Code generated ? ? ? 1
Alice obtains the same outcome with Eve’s if and only if they employ the
common basis. It is also true for Bob and Eve. Otherwise, the outcome is
random as shown with a symbol “?” in the table above. The three parties
share the same outcome if and only if all of them employ a common basis.
In the table above, there are four cases in which Alice and Bob shared the
common basis. However, their outcomes are independently random in three
cases out of four.
Above, we assumed Eve makes measurement first among the three. In fact,
the order does not matter at all. Either Alice or Bob may measure their qubit
first to disentangle the pair. Suppose both Alice and Bob employ the basis
B1 and Eve employs B2 . Alice measures her qubit first to project |Φ+ ⟩ to
100 QUANTUM COMPUTING
|e0 ⟩|e0 ⟩, for example. Now Eve intercepts the second qubit and measures it to
produce either |f0 ⟩ or |f1 ⟩. In both cases, Bob will obtain e0 and e1 randomly
with equal probability upon measurement of his qubit even thought Alice and
Bob employ the same measurement basis.
References
[1] http://www.magiqtech.com/
[2] https://www.toshiba.co.jp/qkd/en/products.htm
[3] https://www.idquantique.com/
[4] https://www.quintessencelabs.com/
[5] C. H. Bennett and G. Brassard, in Proc. IEEE Int. Conf. Comp., Systems
and Signal Processing 175 (1984).
[6] A. Ekert, Phys. Rev. Lett. 67, 661 (1991).
[7] C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).
[8] C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. Rev. Lett. 68,
557 (1992).