Quantum Networks
Quantum Networks
by
Bassam Aoun
&
Mohamad Tarifi
ABSTRACT
2
ACKN OWLE D G E ME N TS
We would like to thank Prof. Alex Lopez-Ortiz for his accessibility that made this possible.
Abstract .......................................................................................................................... 2
Acknowledgements....................................................................................................... 3
Contents ......................................................................................................................... 4
Introduction................................................................................................................... 5
Overview of Quantum Information .......................................................................... 6
Quantum Mechanics................................................................................................. 9
Quantum Computing.............................................................................................. 15
Quantum Communication Protocols................................................................... 19
Quantum Algorithms.............................................................................................. 23
Quantum Cryptography............................................................................................. 29
The BB84 QKD protocol...................................................................................... 33
Possible attack model ......................................................................................... 35
A More realistic approach...................................................................................... 37
Building On Current Infrastructure......................................................................... 42
Security Architecture............................................................................................... 42
System Architecture ................................................................................................ 44
Quantum Network Security ...................................................................................... 50
Byzantine Agreement Problem ............................................................................. 50
Fingerprinting .......................................................................................................... 53
Quantum Contracts .................................................................................................... 56
Internet Of Quantum Computers............................................................................ 61
Bibliography................................................................................................................. 64
IN TRO D UCTIO N
6
photon actually travels along both paths simultaneously, collapsing down to
one path only upon measurement. The following experiment illustrates the last
effect.
7
detector. Consequently, if we cancel out the effect of quantum interference by
placing an absorbing screen on one of the paths, both detectors will registers
50% hits similar to the first experiment. Those potential paths taken by the
photon represent the superposition of the possible photon states.
8
QUANTUM MECHANICS
In this section we introduce the four postulates of quantum mechanics as
they are relevant to our investigation in quantum information processing.
Quantum postulates are very important in a sense that they provide the
connections between the physical, real, world and the quantum mechanics
mathematics used to model these systems.
Postulate 1: Any isolated physical space is associated with a complex vector space with
inner product called the State Space of the system. It states that a system is completely
described by a state vector, a unit vector, pertaining to the state space which
describes all the possible states the system can be in.
where t1, t2 are moments in time and U(t1, t2) is a unitary operator. We should note
that the process is in a sense Markovian (history doesn t matter) and reversible,
since
UU v v
9
Mm
' is the state of the system after measurement outcome m
Mm Mm
occurred,
Postulate 4: The state space of a composite system is the tensor product of the state spaces
of its components
System A : x
System AB : x .
System B :
10
QUBITS
The fundamental resource and basic unit of quantum information is the
quantum bit (qubit). From a physical point of view, a qubit is represented by an
ideal two-state quantum system. Examples of such systems include photons
(vertical and horizontal polarization), electrons and other spin-1/ 2 systems
(spin up and down), and systems defined by two energy levels of atoms or ions.
From the beginning the two-state system played a central role in studies of
quantum mechanics. It is the most simple quantum system, and in principle all
other quantum systems can be modeled in the state space of collections of
qubits.
For the purposes of quantum computing, the basis states 0 and 1 encode
the classical bit values 0 and 1 respectively. Unlike classical bits however, qubits
can be in a superposition of 0 and 1 such as 0 1 where and are
2 2
complex numbers such that 1 . If such a superposition is measured
with respect to the basis { 0 , 1 } , the probability that the measured value is 0 is
2 2
and the probability that the measured value is 1 is .
11
1. A qubit can be in a superposition state of 0 and 1.
TENSOR PRODUCTS
Much computational power of quantum systems comes from the fact that
as the number of qubits increases linearly, the amount of information stored
2
increases exponentially. For example, a single-qubit state is represented
by a pair of complex numbers: 0 1 . The composite state of two
4
qubits is an element of :
00 00 01 01 10 10 11 11 .
8
The composite state of three qubits is in , and so on.
basis {ui v j |1 i n ,1 j m} .
A B A U B U a b a U b U
U and U
C D C U D U c d c U d U
12
The tensor product of several matrices is unitary if and only if each one of
the matrices is unitary up to a constant. Let U A1 ... An . Then U is unitary if
Ai Ai ki I and i
ki 1.
( v1 u1 , v2 u2 ) ( v1 , v2 ).( u1 , u2 ),
v1 u1 v2 u2 v1 v2 u1 u2 ,
{0 1
0 2, 0 1
1 2,11 0 2,11 1 2}
13
{ 00 , 01 , 10 , 11 }
2n 1
A typical quantum state for an n-qubit system is ai i where
i 0
2
ai , a 1 , and { i } is the basis, with i written as an n-bit binary number.
This is because
(a1 0 , b1 1 ) (a2 0 b2 1 ) a1a2 00 a1b2 01 b1a2 10 , b1b2 11 and a1b2 = 0
implies that either a1a2 = 0 or b1b2 = 0. States which cannot be decomposed in
this way are called entangled states. These are states that don't have classical
counterparts, and for which our intuition is likely to fail.
probability of measuring the first bit as 0 is 1/ 2 if the second bit has not been
14
measured. However, if the second bit has been measured, the probability that
the first bit is measured as 0 is either 1 or 0, depending on whether the second
QUANTUM COMPUTING
This exponential growth in number of states, together with the ability to
subject the entire space to transformations (either unitary dynamical evolution
of the system, or a measurement projection into an eigenvector subspace),
provides the foundation for quantum computing.
15
one or many qubits) implements a reversible computation. That is, given the
output of the gate, it must be possible to unambiguously determine what the
input was. Fortunately, there is a classical theory of reversible computation that
tells us that every classical algorithm can be made reversible with an acceptable
overhead, so this restriction on quantum computation does not pose a serious
problem. It is something that must be kept in mind when proposing a
specification for a quantum gate, however.
not ( 0 1) 1 0 0 1
0 1
not
1 0
0 1
so we can identify the action of not with the matrix x .
1 0
16
Similarly, we can find some useful single-qubit quantum state
transformations. Because of linearity, the transformations are fully specified by
their effect on the basis vectors. The associated matrix is also shown. They are
known as the four the four Pauli gates.
0 0 1 0
I:
1 1 0 1
0 1 0 1
y :
1 0 1 0
0 0 1 0
z :
1 1 0 1
0 1 0 1
y y
1 0 1 0
Another very important gate is the Hadamard gate defined by the following
transformation:
0 0 1
H:
1 0 1
17
Applied to n bits each in the 0 state, the transformation generates a
superposition of all 2n possible states.
2n 1
n n 1 1
H 0 (( 0 1) ... n times ... ( 0 1 )) x
2n 2n x 0
i
1 0 i e 8
0
T i
e8
4 i
0 e 0 e8
Any arbitrary quantum gate could be synthesized from only a small minimal
set. This universal set is the quantum analog of the universal gate (NOR or
NAND) for classical systems. A universal set of operations is: H, X, T, and
CNot.
CNOT 00 = 00
CNOT 01 = 01
CNOT 10 = 11
CNOT 11 = 10
Classically, we can think of the c-not as flipping the second register if and
only if the first register is set to 1. The transformation Cnot is unitary since
18
Cnot Cnot and Cnot Cnot I . The Cnot gate cannot be decomposed into a tensor
The protocols require that initially Alice and Bob share an EPR pair (the
sender has one half and the receiver has the other). Such a state would have
been created ahead of time when the qubits were together. This entanglement
becomes a resource which Alice and Bob use to achieve protocols such as the
following.
19
Super Dense Coding
The idea is to send two classical bits of information by only sending one
quantum bit. The protocol proceeds as follow:
If Alice wishes to send the bits 00 to Bob, she does nothing to her qubit (or
equivalently, applies the identity gate I). If she wishes to send 01, she applies
the x gate to her qubit. If she wishes to send 10, she applies the z gate, and if
she wishes to send 11, she applies i y (if necessary review the Pauli gates from
the previous section).
1 I 1
( 00 11 ) ( 00 11 ) 00
2 2
2. If classical bits are 01 , apply x :
1 1
( 00 11 ) x
( 01 10 ) 01
2 2
3. If classical bits are 10 , apply z :
1 1
( 00 11 ) z
( 00 11 ) 10
2 2
4. If classical bits are 11 , apply i y :
1 i y
1
( 00 11 ) ( 01 10 ) 11
2 2
Until this stage, Alice just performed local unitary transformation on her
qubit. Now Alice sends to Bob her qubit. From the above analysis, Bob is in
20
possession of one of the above Bell states. Finally, he simply perform a
measurement of the joint 2-qubit state in the Bell basis { 00 , 01 , 10 , 11 }.
They key to super-dense coding is that they are orthonormal from each other
and are hence distinguishable by a quantum measurement. That way, quantum
mechanics allowed us to communicate two classical bits at the cost of one
quantum bit.
Quantum Teleportation
Here is a protocol that allow Alice to communicate to Bob the state of a
qubit 0 1 . Classically, this would require communicating the value of
and with an infinite amount of precision and therefore would turn out to be
impossible. But, using one more time the properties of entanglement, we will
illustrate how this would be possible.
1
00 ( 00 11 )
2
21
classical information is transmitted to the destination. This classical information
is used to fix up the destination qubit
Line 1 and 2 represents Alice's qubits, while line 3 (bottom line) represents
Bob's qubit. The meters represent measurement devices, and the double lines
coming out of them represent a classical channel (like a telephone) across
which Alice can communicate the results of her measurements to Bob.
22
QUANTUM ALGORITHMS
Quantum algorithms are methods using quantum networks and processors
to solve algorithmic problems. On a more technical level, a design of a
quantum algorithm can be seen as a process of an efficient decomposition of a
complex unitary transformation into products of elementary unitary operations
(or gates), performing simple local changes.
Superposition
Interference
Entanglement
Measurement
FACTORING
The publication of P. Shor s quantum algorithm for efficiently factoring
numbers was the key event that stimulated many theoretical and experimental
investigations of quantum computation. One of the reasons why this algorithm
is so important is that the security of widely used public key cryptographic
protocols relies on the conjectured difficulty of factoring large numbers.
23
To factor a number M, we choose a number y < M with gcd(y,M) = 1. We
then find r, the order of y in the multiplicative group (mod M). If r is even,
r r
then (y 2
1)(y 2
1) (y r 1) 0 (mod M ) . Then gcd(yr-1,M) is a non-trivial factor
r
of M except when r is odd or y 2 1 (mod M) . This procedure produces a non-
1
trivial factor of M with probability at least 1 , where k is the number of
2k 1
distinct odd prime factors of M. If we don't get a factor, we can choose a new y
and repeat the process. By repeating the process, we can make our likelihood of
success as close to one as we like.
where f (a ) y a (mod M ) .
24
4. We want to find the period of the function f (a ) y a (mod M ) . We do
that by measuring to find a state whose amplitude has the same period as
f.
C g ( a ) a, u ,
a
1 if f (a ) u
g (a)
0 otherwise
Note that the a's that actually appear in the sum, those with g (a ) 0 ,
differ from each other by multiples of the period, and thus g(a) is the
function we are looking for. If we could just measure two successive a's
in the sum, we would have the period. Unfortunately the quantum world
permits only one measurement.
25
n ca
QFT 1 2 1 2 i
2n
a e c
2c0
QFT
g (a) a g (c ) c
a c
2n
C' j j
j r
where j 1 . When the period r does not divide 2n, the transform
26
The construction makes use of two types of gates. One is the Hadamard
transformation illustrated in previous sections. This is an exponential speed-up
of the process since it can be accomplished in approximately n2 operations
rather than n2n.
27
2. Apply a unitary transformation that computes P(xi) on this register:
2n 1 2n 1
1 1
UP : x, 0 x, P ( x )
2n x 0 2n x 0
For any x0 such that P(x0) is true, x0 ,1 will be part of the resulting
1
superposition, but since its amplitude is , the probability that a
2n
1
measurement produces x0 is only .
2n
6. Measure the last qubit of the quantum state, representing P(x). Because of
the amplitude change, there is a high probability that the result will be 1. If this
is the case, the measurement has projected the state onto the subspace
2k
1
xi ,1 where k is the number of solutions. Further measurement of the
2k i 1
28
Q UAN TUM CRYPTO G RAPH Y
BASIC IDEAS
30
quantum cryptography in this section as quantum key distribution, since this is all what
is implemented so far.
Entanglement
31
states. But because of their common origin, the properties of the photons are
entangled.
Photons polarizations
32
THE BB84 QKD PROTOCOL
Quantum transmission
In the first step, Alice sends individual qubits to Bob in states chosen at
random among the four states: , , / , \ which are identified as the
polarization states horizontal , vertical , 45° , and 135° , respectively.
The individual qubits could be sent all at once or one after the other (much
more practical), the only restriction being that Alice and Bob be able to
establish a one-to-one correspondence between the transmitted and the
received spins.
Next, Bob measures the incoming qubits in one of the two bases, chosen at
random (using a random-number generator independent from that of Alice).
33
Alice s random string 1 0 1 0 0 1 1 0 1 1 0 1 0
Bob's results: / / \ \ \ \ /
Consequently, from the probability theory, Bob will use a correct polarizer
half of the time and an incorrect polarizer the other half of time. But 50% of
the second half, he will still get the correct result and 50% he will get an
incorrect result. Thus Bob will come up with the correct result 0.5 * 1 + 0.5 *
0.5 = 75% of the time. Under the perfect situation, uncertainty principle tells us
neither Bob nor Oscar on average can obtain a measurement better than 75%.
At this point, Bob and Alice will have perfectly correlated results whenever
they use the same basis but uncorrelated results otherwise.
Basis reconciliation
Valid data: | / - \ | \ | /
34
Translated to key: 10 0 11 1 10
At this stage of the protocol, Alice and Bob use a public channel for basis
reconciliation. This is very common in crypto-protocols. This channel does not
have to be confidential, only authentic.
Our analysis suggests that neither Alice nor Bob can decide which key
results from the protocol. We can state that a secret key was established
between them. Neither party in fact sent a secret key to the other. Indeed, it is
the conjunction of both of their random number generator (or free will!) that
produced the key.
Tentative attack
35
N o cloning Theorem
The no-cloning theorem states that there is no unitary transformation that can
take a state n
0 n
into the state n n
for arbitrary n
.
The no-cloning theorem is an immediate consequence of linearity. If
U( 0) and U ( 0) (1)
then it follows from linearity that
U (a b )0 aU 0 bU 0 a b (2)
a2 b2 ab ab , (3)
Failed attack
36
it prevents Oscar from perfect eavesdropping and hence makes QC potentially
secure.
So far, all we have shown is that Alice and Bob can arrive at a shared key
without publicly announcing any of the bits. But in real life there are always
some errors due to noise in the channel and the equipments, and from Oscar
who is trying to gain information.
On the other hand, Oscar will higher the quantum bit error rate (QBER)
through intercepting the photons as they are transmitted from Alice to Bob.
Since communication errors and eavesdropping cannot be distinguished, Alice
and Bob have to assume that all discrepancies are due to Oscar in order to be
on the safe side.
Therefore, Alice and Bob must apply some classical information processing
protocols, like error correction and privacy amplification to their data. The first
protocol is necessary to obtain identical keys and the second to obtain a secret
key.
37
Intercept-resend strategy
Those equally likely previous scenarios necessarily happen since Oscar has
no information about Alice s random-number generator (hence the importance
of the generator being truly random)
Analysis
Bob Right
Polarizer
Oscar Right
0.5 * 1 = 0.5
Polarizer
Oscar Wrong
0.5 * 0.5 = .25
Polarizer
38
The correct rate in average is 0.5 + 0.25 = 0.75, such that the error rate in
average is 1 - 0.75 = 0.25. In this case, Oscar gets 50% information whereas he
leaves a 25% error rate in the sifted key. Alice and Bob can thus easily detect
the presence of Oscar. We will assume in the following that Oscar perform two
actions: opaque eavesdropping with probability of and no eavesdropping with
probability of 1- . Thus Bob s row key will not agree with Alice s row key with
probability of 0.25 * = 0.25 . If, however, Oscar applies this strategy to only
a fraction of the communication, say = 10%, then the error rate will be only
2.5%, while Oscar s information will be 5%.
At this stage, this key contains errors. The errors are caused by technical
imperfections, as well as possibly by Oscar s intervention. Reconciliation is
the first classical information processing protocol performed on the sifted key
to obtain identical keys between Alice and Bob. Since Oscar presumably listens
to all public transmissions, Alice and Bob must reveal as little information as
possible while still ensuring that they end up with identical keys. Error
reconciliation like the base reconciliation is performed over a public channel.
We will follow in the following the BBBSSx reconciliation procedure.
In order to minimize the information exposed to Oscar, Alice and Bob first
agree on a random permutation of the bits in their sifted keys (to randomize
the location of errors). Then, they split the resulting string into blocs of size b.
The constant b is chosen experimentally (BBBSS implementation) rather
theoretically such that it is unlikely to contain more than one error. Alice and
Bob then compare the parity of each bloc. If they find a pair of blocks with
mismatched parities, they continually bisect the block into smaller and smaller
39
blocks, comparing parities each time, until the error is found. Finally, to ensure
that Oscar learns nothing from this process, Alice and Bob discard the last bit
of each block whose parity they disclose. At the end, if the resulting error-rate
ereal > emax then Alice and Bob abort.
At this point, Alice and Bob possess identical strings, but those strings are
not completely private. Oscar may have gained some information about them
through intercept/ resend. During the reconciliation phase, Oscar did not gain
any information, since the last bit of each parity check block was discarded.
However, some of his original information about specific bits may have been
converted to information about parity bits.
40
THE B92
CONCLUSION
41
BUILD IN G O N CURRE N T IN FRASTRUCTURE
SECURITY ARCHITECTURE
The following figure resolves this basic setup into considerably more detail.
2. The transmit side prepares and transmits raw keys, from which both
sides come to agreement on a shared, secret key;
43
Figure 2 provides a multi-layer approach for the QKD protocol explained in
detail in the previous section. Those layers outline the degree of freedom each
layer exhibit when looking for design alternatives.
SYSTEM ARCHITECTURE
44
collection of one or more local Ethernets that connect to the public internet via
specialized devices such as VPN gateway. That way, one needs to administer
only a single device in order to establish or monitor external security for a given
private enclave. These gateways are responsible for setting up security
associations (and thus encrypted tunnels) with authorized distant gateway(s),
for encrypting all local traffic before it is injected into the public network and
for decrypting and authenticating traffic received from the public network
before sending it onwards, in the clear, within the destination enclave. Given
the nature of QKD, one would need two distinct communications paths: one
for the cryptographic keys themselves, the other for the encrypted message
traffic.
The above architecture suffers from striking drawbacks mainly due to the
current technology. As discussed previously, fiber attenuation and error
infiltrations limit terrestrial links to 50 km or less. Unfortunately, the point-to-
point architecture is geographically constrained by the distance over which a
45
single link may be operated. Moreover, isolated point-to-point links are subject
to simple denial-of-service attacks such as active eavesdropping or cutting the
fiber. Finally, in practice it may be prohibitively expensive to establish pair wise,
dedicated point-to-point links between all private enclaves that wish to
communicate with each other.
Such QKD networks can be built in several ways. In one variant, the QKD
relays may transport only keying material but never message traffic. Thus after
the various relays have established pair wise agreed-to keys along an end-to-end
point, e.g. between the two QKD endpoints, they may employ these key pairs
to securely transport a key hop by op from one endpoint to the other, being
one-time-pad encrypted and decrypted with each pair wise key as it proceeds
from one relay to the next. In this approach, the end-to-end key will appear in
the clear within the relays memories proper, but will always be encrypted when
passing across a link. Such a design may be termed a key transport network .
46
Figure 8: QKD network with trusted relays and link encryption.
In another variant, the QKD relays may transport both keying material and
message traffic. Figure 4 illustrates this second variant, in which the relays are
acting as internet-like routers with pair wise QKD mechanisms providing link
encryption between the routers. In essence, each IP datagram of message
traffic is encrypted once as it transits from the QKD endpoint to its first relay.
Then it is decrypted, held in the clear in the relay s memory, and then re-
encrypted with a second set of keys and sent onwards to the next relay. This
operation proceeds, hop by hop, until the datagram is finally received at the
destination endpoint and sent onwards to the attached private enclave. We note
that this network differs from the standard definition of the internet by
interposing a set of encrypted tunnels ( virtual links ) between cooperating
routers.
The prime weakness of the above architecture is that the relays must be
trusted. That is, since keying material and directly or indirectly message
traffic are available in the clear in the relays memories, these relays must be
47
prevented from falling into an adversary s hands. Therefore, all users in the
system must trust the network (and the network s operators) which provide all
keys to their message traffic. Thus one should be careful if he deals with
unusual sensitive traffic. However, fibers or free space links between the relays
do not need such protection.
48
distribution network or its operators. This feature may be extremely important
for highly secure networks. Their weaknesses appear significant, however.
Unlike trusted relays, the untrusted switches cannot extend the geographic
reach of a QKD network. In fact, they may significantly reduce the network s
reach since each switch adds at least several dB losses to the photonic path. In
addition, it will likely prove difficult in practice to employ a variety of
transmission media within an untrusted network, since a single frequency may
not work well along a composite path that includes both fiber and free space
links. Untrusted networks may also introduce new vulnerabilities to traffic
analysis.
49
Q UAN TUM N E TWO RK SE CURITY
1. First, the sender S sends the bit x to be broadcast to the two receivers
R0 and R1, using the classical channels. Let us denote x0 and x1 the bits
received by R0 and R1, respectively. Next, the Sender S measures all his qutrits
in the z-basis. Whenever he gets the result x, S sends the index j to both
receivers. Accordingly, the players R0 and R1 receive each a set of indices, J0
and J1, respectively
2. Both receivers test the consistency of their data. For this they measure
their qutrits in the z-basis. If all results with indices in Jp differ from xp, then
player Rp has consistent data and he sets a flag yp = xp. If a set of data is
inconsistent, then the player sets his flag to yp =? (interpreted as inconsistent).
3. The two receivers send their flags to each other. If both flags agree
then the protocol terminates with all honest players agreeing on x.
51
5. It remains only the interesting case that both receivers claim that they
received consistent, but different, data. The strategy we propose then is that
player R1 will not change his bit y1, unless player R0 convinces him that he did
indeed receive the bit y0 from the sender in a consistent way. To convince his
partner of his honesty, player R0 sends him all the indices k belongs to J0 for
which he has the result 1-y0.
(a) "Almost all" indices k from R0 are not in R1's index set J1, and such
that
(b) These k indices correspond to qutrits for which R1's results are
"almost all" equal 2. If R0 indeed got an index set that is consistent with bit y0
then S holds y0, R0 holds 1-y0, and hence, R0's result must be a 2. If the test
succeeds, player R1 changes his bit to y0, otherwise he keeps y1.
52
FINGERPRINTING
Let s move to a different problem in network security: Fingerprinting, a
mechanism that arises in the study of communication complexity, is the
problem of determining if two strings are equal as little communication and
storage of information as possible.
The power behind quantum systems that allow this exponential save up
is that quantum systems contain large sets of nearly orthogonal states. It is
known that there are sets of 2n states that are nearly orthogonal pair wise in O(
log2n)-qubit systems. Buhrman, Cleve, Watrous, and Wolf used these pairs to
encode the strings:
m
1
hx i Ei ( x)
m i 1
53
Where E i(x) is the error correcting codes for our strings - these are just
expanded version of n into m = cn, such that and such that the distance
between distinct code words E(x) and E(y) is at least (1 ) m.
The circuit distinguishes between two states | > and | > . If the two
states are equal the circuit is guaranteed to output true, otherwise it outputs
true with probability (1+ 2)/ 2. Thus we can repeat this protocol if the result
keeps on being true until we are satisfied with the probability of success.
It is easy to see that O( log2n) is nearly optimal for quantum, given that
any k-qubit quantum state can be specified with exponential precision using O
(k2k) bits and since O (n1/2) is the lower bound on size of the fingerprint for
classical bits.
The possibilities and the limitations of quantum schemes are still unclear,
the field is still immature and our intuition has yet to adapt to strange world of
quantum mechanics. Perhaps the best demonstration of this is the history of
quantum bit commitment:
54
Suppose that Alice has a bit b, a commitment scheme ensures to Bob
that Alice cannot change the value of b, while it ensures to Alice that Bob
knows the value of b only after a given time.
55
Q UAN TUM CO N TRACTS
Bob: C Bob: D
and the corresponding payoff are taken from the payoff matrix.
The role of J s is to entangle the states together enabling different
strategies that correspond to relations between player s decisions. If we
choose J to maximally entangle the qubits we discover a new Nash equilibrium
strategy Q that effectively avoids the dilemma; when both players adopt Q, the
resulting payoff is (3, 3).
Suppose Bob would like to use some information that Alice posses.
Alice would like to satisfy Bob s demand, however she does not wish to allow
57
him to use this information after a certain time. Let us further assume that Bob
would benefit from keeping the information after that time.
If Alice trusts Bob then she can give him the information, however since
Bob might keep the information, Alice rational choice depends on the
following payoff matrix:
Bob is F Bob is
NF
A one-sided QCNT scheme for this situation is for Alice to entangle the
qubits representing the information to be sent to Bob with qubits she posses;
then she will measure her qubits at the end of the allotted time. Effectively this
will eliminate the -5 loss if Bob is unfaithful. The only possible scenarios left
are shown bellow.
Bob is F Bob is
NF
58
The security of this QCNT is guaranteed by the non-cloning theorem
and inability to perfectly distinguish between non-orthogonal states. Note that
it is natural in the context of this problem that Alice allows limited amount of
information to leak.
In a double sided QCNT scheme for this problem, Alice entangles the
qubits in her possession obtaining {b1,1 , b2,1 bn,1} and {b1,2, b2,2 bn,2},
where each pair bi,1 bi,2 is a maximally entangled state having same coefficients
as bi. Bob does the same thing obtaining {a1, 1, a2, 1 an, 1} and {a1, 2, a2, 2
an,2}. Next, both Bob and Alice exchange the states {b1, 1, b2, 1 bn, 1} and {a1,
, a2, 1
1 an, 1}.
59
Both Alice and Bob posses a method for testing for data integrity and
they will then repeatedly use it to find if the data got corrupted by the opposing
party. The contract can be clearly presented in a program:
While (t<t1) {
60
IN TE RN E T O F Q UAN TUM CO MPUTE RS
61
The next protocol is a means of entanglement distribution. As we have
seen in the introduction, superdense coding and quantum teleportation imply a
tradeoff in quantum communication in which a qubit and an EPR pair is
equivalent to 2 classical bits and an EPR pair.
One way of transmitting messages between Alice and Bob is to simply
teleport the qubits from Alice to her router at level-0 then iteratively up to a
common level-c then iteratively down to level-0 in Bob s neighborhood and
finally to Bob.
An alternative way uses our entanglement distribution protocol. In
1
which the mediating router prepares a bells state ( 00 11 ) and Teleports
2
the first qubit to Alice and the second to Bob. To our excitement the resulting
qubits obtained by Alice and Bob are still in the Bell state.
In other words the protocol transfers the setting in which Alice and Bob
share an entangled state with the router to a setting in which Alice shares an
entangled state with Bob.
62
quantum channels. The protocol will set up entangled states between Alice and
Bob which can be then used to teleport the qubits directly.
We only give a hint on the third protocol since more work is being done
on it and a related family of protocols. The setting is such that Alice can
ensure that Bob performed a computation himself. This can be done when
Alice entangles her data on which the computation to be performed with data
that she posses, then Alice can check that Bob has not measured the qubit by
measuring a certain subset on some bases.
We are currently working on crossing between Quantum contracts and
the quantum internet; this is to be published soon.
What other discoveries awaits from our realization that information is
physical? It is proven that if quantum mechanics turns out to be non-linear
then it is straightforward that BQP=NP. What if we consider General
Relativity? For one it tells us that computation is best done in the lowest
density regions of space (?), what if time loops are allowed? What about string
theory?
These are all intriguing questions but for now, our minds are allowed to
relax It will be a long time before our Quantum Computers seem too slow...
63
BIBLIO G RAPH Y
v http://www.magiqtech.com/press/Magiq_Navajo_Launch.pdf
vi http://www.magiqtech.com/press/Economist_Uncrackable_Beams_Of_Light.pdf
vii New Journal of Physics 4 (2002) 46.1 46.12 (http://www.njp.org/)
viii The project staff are Professor Seth Lloyd, Professor Jeffrey H. Shapiro, Dr. N.C. Wong, Dr. Selim Shahriar,
Dr Vittorio Giovanetti and Dr. Lorenzo Maccone
ix http://www.securitypipeline.com/story/showArticle.jhtml?articleID=15500200
x Bennett, C. H., Bessette, F., Brassard, G., Salvail, L., and Smolin, J., Experimental Quantum Cryptography, Journal
of Cryptology, vol. 5, no.1, 1992, pp. 3-28.
xi Ivanovic, 1987; Peres, 1988
xii Bennett C H and Brassard G 1984 Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing
(Bangalore) (New York: IEEE) p 175
xiii Building the quantum network, Chip Elliott (BBN Technologies) New Journal of Physics 4 (2002)
46.1 46.12 (http://www.njp.org/)
xiv A. Yao in Proceedings of the 11th Annual ACM Symposium on Theory of Computing
xv I. Newman and M. Szegedy, in Proceedings of the 28th Annual ACM Symposium on Theory of Computing
xvi Lo, Hoi-Kwong , H. F. Chau Is quantum bit commitment really possible?
xvii Mayers, Dominic Unconditionally secure quantum bit commitment is impossible
xviii A. Kent Quantum Bit String Commitment
xix J. Eisert, M. Wilkens, M. Lewenstein Quantum Games and Quantum Strategies
xx
Efficient scheme for initializing a quantum register with an arbitrary superposed state
Gui-Lu Long and Yang Sun
64
This document was created with Win2PDF available at http://www.daneprairie.com.
The unregistered version of Win2PDF is for evaluation or non-commercial use only.