SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Security of continuous-variable quantum key
    distribution against general attacks
                        arXiv: 1208.4920


              Anthony Leverrier (ETH Zürich)

       with Raúl García-Patrón, Renato Renner and Nicolas J. Cerf


                         QCRYPT 2012
Quantum Key Distribution with continuous variables

  What’s different?
       Alice encodes information on the quadratures (X , P) of the EM field
       Bob measures with an homodyne (interferometric) detection




                                                 Grosshans et al., Nature 421 238 (2003)

  Features
       no need for single-photon counters
       compatible with WDM                                   Bing Qi et al. NJP 12 103042 (2010)
       "Gaussian Quantum Information"                  C. Weedbrook et al, RMP 84 621 (2012)


                      Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks
Many protocols
  Four Gaussian entangled protocols
                                                       √                ∞
    1    Alice prepares N EPR pairs |Ψ =                1 − x2          n=0   x n |n, n
    2    for each pair, she keeps one mode and sends the other one to Bob
    3    Alice and Bob perform either homodyne or heterodyne detection
             homodyne = measuring X OR P
             heterodyne = measuring X AND P (with higher noise)

  Prepare and measure versions

        homodyne meas. for Alice
        ⇔ preparation of a squeezed
        state


        heterodyne meas. for Alice
        ⇔ preparation of a coherent
        state


                      Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks
Description of the protocol




      A and B measure ρn with homodyne/hererodyne detection
                       AB

           Alice obtains x = (x1 , x2 , · · · xn ) ∈        R  n

           Bob obains y = (y1 , y2 , · · · , yn ) ∈         R  n


      (Reverse) reconciliation: Bob sends some information to Alice who
              ˆ
      guesses y
      Privacy amplification: Alice and Bob apply some hash function and
      obtain (SA , SB ) plus some transcript C of all classical information

  QKD protocol: map E

                                    E : ρn −→ (SA , SB , C)
                                         AB


                      Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks
Experimental implementations

      in fiber:
      Qi el al, PRA (2007), Lodewyck et al, PRA (2007), Fossier et al, NJP (2009),
      Xuan et al, Opt Exp (2009) · · ·
      in free space:
      S. Tokunaga et al, CLEO (2007), D. Elser et al, NJP (2010), B. Heim et al, APL
      (2010) · · ·
      with an entangled source T. Eberle et al, arXiv preprint (2011), L. Madsen et
      al, arXiv preprint (2011)


  Reliable technology
  field test during more than 6 months over around 20 km
                                                    P. Jouguet et al. Opt Expr 20 14030 (2012)


  Long distance
  Current record: over 80 km!                           ⇒ see P. Jouguet’s talk on Friday!

  What about security?

                       Anthony Leverrier (ETH Zürich)      Security of CVQKD against general attacks
Security proofs for CV QKD (before 2012)
  OK · · · in the asymptotic limit
       de Finetti theorem for infinite-dimensional quantum systems
       ⇒ collective attacks are asymptotically optimal
                                                                    R.Renner, J.I. Cirac, PRL (2008)
       Gaussian attacks are asymptotically optimal among collective attacks
                                                       R.García-Patrón, N.J. Cerf PRL (2006)
                                              M. Navascués, F. Grosshans, A. Acín PRL (2006)


  Problems
       de Finetti useless in practical settings: convergence is too slow
       parameter estimation is problematic for CVQKD (unbounded variables)

  Two solutions
                                                                               1
       Entropic uncertainty relation:        Hmin (X |E) + Hmax (P|B) ≥ N log c(δ)
                F. Furrer et al, PRL 109 100502 (2012) ⇒ see Fabian’s talk on Friday!
       combining the postselection technique (M. Christandl et al, PRL 2009)
       with symmetries in phase space ⇒ this talk

                      Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks
Security definition
  A protocol E is secure if it is undistinguishable from an ideal protocol
  F : ρn −→ (S, S, C):
       AB
       F outputs the same key S for Alice and Bob
       S is uniformly distributed over the set of keys and uncorrelated with
       Eve’s quantum state:
                                    1
                        ρSE =                   |s1 , · · · , sk s1 , · · · , sk | ⊗ ρE .
                                    2k
  For instance, F = S ◦ E where S replaces (SA , SB ) by a perfect key (S, S).

   -security: ||E − F || ≤
            ⇒ the advantage in distinguishing E from F is less than .


                      ||E − F|| := sup (E − F) ⊗ idK (ρABE )                            1
                                            ρABE


  How to compute the diamond norm?
  If the maps are permutation invariant: postselection technique
                                                    M. Christandl, R. König, R. Renner, PRL 2009
  · · · but only for finite dimension

                       Anthony Leverrier (ETH Zürich)     Security of CVQKD against general attacks
The postselection technique
  For protocol invariant under permutations:

                                                       Theorem [Christandl et al.]
                                                                                      2
                                                                                          −1
                                                       ||E−F|| ≤ (n+1)d                        ||(E−F)⊗id(τHR )||1

                                                       where
                                                              d = dim(HA ⊗ HB )
                  ≡
                                                              τHR is a purification of
                                                                       ⊗n
                                                              τH = σH µ(σH )
                                                       ||(E − F) ⊗ id(τHR )||1 is exponentially
                                                       small for protocols secure against
                                                       collective attacks


  Security against collective attacks implies security against general attacks if
       the protocol is permutation invariant
       the dimension of HA ⊗ HB is finite


                      Anthony Leverrier (ETH Zürich)    Security of CVQKD against general attacks
Dealing with infinite dimension




  Two ideas
    1   We prepend a test T to the protocol:
              if the test succeeds, Alice and Bob continue with the usual protocol
              otherwise they abort
        The goal of the test is to make sure that the state ρn contains not too
                                                             AB
        many photons, i.e. is close to a finite dimensional state.
    2   The permutation symmetry is not sufficient for the test:
        ⇒ we exploit symmetries in phase space specific to CV QKD.




                       Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks
Sketch of the proof

  Some notations
       E0 : ρn → (SA , SB , C): the usual protocol, secure against collective
             AB
       attacks; and F0 := S ◦ E0 the ideal version
       a test T : ρN → ρn ⊗ {pass/fail} with N > n
                   AB   AB

       a projection P : (HA ⊗ HB )⊗n → (HA ⊗ HB )⊗n with

                   HA := Span(|0 , · · · , |dA − 1 ); dim(HA ) = dA < ∞

                   HB := Span(|0 , · · · , |dB − 1 ); dim(HB ) = dB < ∞
       the new protocol of interest: E := E0 ◦ T : ρN → (SA , SB , C)
                                                    AB




  ||E − F ||   ≤   ||E0 PT − F0 PT || + ||E − E0 PT || + ||F − F0 PT ||
               =   ||E0 PT − F0 PT || + ||E0 ◦ (id − P) ◦ T || + ||F0 ◦ (id − P) ◦ T ||
               ≤   ||E0 PT − F0 PT || + 2||(id − P) ◦ T ||
                     Postselection technique           small for a "good" test



                      Anthony Leverrier (ETH Zürich)     Security of CVQKD against general attacks
How to choose the test T ?
  Note: because Eve does not interact with Alice’s state, it is sufficient to apply
  the test on Bob’s state ρN .
                           B
  Goal: find T such that ||(id − P) ◦ T || ≤ , i.e.

               Prob [passing the test]                    AND       max mk ≥ dB                  ≤
                                                                       k


  where mk is the result of a photon counting measurement of mode k of ρn .
                                                                        B

  Idea: photon counting ≈ energy measurement ≈ heterodyne detection
  T should be easy to implement: one measures m := N − n modes with
  heterodyne detection:
       results: z = (z1 , z2 , · · · , z2m )
       given z, pass or fail


  Permutation symmetry is not sufficient
  In fact, even independence is not sufficient.
  Ex: ρN = σ ⊗N with σ = (1 − δ)|0 0| + δ|N N|. The probability of passing the
  test is large, but the projection will fail if δ = O(1/N).

                         Anthony Leverrier (ETH Zürich)     Security of CVQKD against general attacks
Transformations in phase space
  U ∼ U(n): group generated by phase shifts and beamsplitters
    =
  ⇒ act like orthogonal transformations in phase space.




  Action of phase shits and beamsplitters on n modes
  There exists U ∈ U(n): V = Re(U) and W = −Im(U)

                                a → Ua;              a† → U ∗ a†

                                 X               V     W          X
                                        →
                                 P              −W     V          P
  ⇒ U commutes with a heterodyne detection

                    Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks
Symmetry in phase space
  For any linear passive transformation in phase space U (corresponding to a
  network of beamsplitters and phase shifts), there exists an orthogonal
                     R
  transformation in 2N such that:
                                          One can assume that
                                                                                         ∗
                                                             ρN is invariant under UA ⊗ UB
                                                              AB

                                                             UρN U † = ρN
                                                               B        B              ∀U.
                                                      ⇒   ρN
                                                           B   =                 n
                                                                        k =0 λk σk



                 ≡                                     n            1
                                                      σk =      n+k −1
                                                                                              |k1 · · · kN k1 · · · kN |
                                                                  k         k1 +···+kN =k


                                                      ρN is a mixture of generalized N-mode
                                                        B
                                                      Fock states
                                                      ⇒ very unlikely to pass the test and
                                                      fail the projection P

                         R
  The vector (X, P) ∈ 2n is uniformly distributed on the sphere of radius
    ||X||2 + ||P||2 ⇒ concentration of measure on the sphere.

                     Anthony Leverrier (ETH Zürich)    Security of CVQKD against general attacks
The test




  Bob computes:
                                 2       2               2
                           Z := y2n+1 + y2n+2 + · · · + y2N

      If Z ≤ (N − n)Ztest , Alice and Bob continue
      otherwise, they abort
  Concentration of measure:
                                                      2            2
       Prob [test succeeds] AND                      y1 + · · · + y2n ≥ n (Ztest + δ)               ≤

                    Anthony Leverrier (ETH Zürich)      Security of CVQKD against general attacks
The test




  Bob computes:
                                 2       2               2
                           Z := y2n+1 + y2n+2 + · · · + y2N
      If Z ≤ (N − n)Ztest , Alice and Bob continue
      otherwise, they abort
  Concentration of measure:
                                                      2            2
       Prob [test succeeds] AND                      y1 + · · · + y2n ≥ n (Ztest + δ)               ≤

                    Anthony Leverrier (ETH Zürich)      Security of CVQKD against general attacks
Sketch of the proof


                                                  n
       Prob [pass test]         AND               i=1   Xi2 + Pi2 ≥ C1 n ≤                   test
                                                  n
       Prob [pass test]         AND               i=1
                                                        ˆ
                                                        ni ≥ C2 n ≤              test

                                                    ˆ                     n
       Prob [pass test]          AND            max ni ≥ C3 log           test
                                                                                        ≤   test


  for some explicit constants C1 , C2 , C3

  Putting all together
                                            n
       choose dA , dB = O log              test

       postselection technique: if E0 is 0 -secure against collective attacks,
       then E is -secure against general attacks with
                                                    O (log4 (n/ test ))
                                           =      02                      +2       test .


  ok because one can take             0   = 2−cn .



                         Anthony Leverrier (ETH Zürich)       Security of CVQKD against general attacks
Conclusion


  Summary
  We show that collective attacks are optimal for Gaussian protocols thanks to
  two ideas
       prepending an test to the usual protocol to truncate the Hilbert space
       permutation symmetry is not sufficient to prove security: one needs
       rotation invariance in phase space


  Open questions
  Our proof is somewhat suboptimal: first, we truncate, then we use the
  finite-dimensional postselection technique
       Can we generalize the technique for maps which are symmetric in
       phase space?
       Same question for de Finetti theorem (only partial results are known)




                     Anthony Leverrier (ETH Zürich)   Security of CVQKD against general attacks

Contenu connexe

Tendances

Compressed Sensing and Tomography
Compressed Sensing and TomographyCompressed Sensing and Tomography
Compressed Sensing and TomographyGabriel Peyré
 
Bayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal modelsBayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal modelskhbrodersen
 
Second Order Perturbations During Inflation Beyond Slow-roll
Second Order Perturbations During Inflation Beyond Slow-rollSecond Order Perturbations During Inflation Beyond Slow-roll
Second Order Perturbations During Inflation Beyond Slow-rollIan Huston
 
Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...
Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...
Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...avinokurov
 
Quantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural NetworksQuantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural NetworksValentin De Bortoli
 
Guarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized ComplexityGuarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized ComplexityAkankshaAgrawal55
 
Wasserstein GAN
Wasserstein GANWasserstein GAN
Wasserstein GANJinho Lee
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
Fine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsFine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsAkankshaAgrawal55
 
Recent developments in control, power electronics and renewable energy by Dr ...
Recent developments in control, power electronics and renewable energy by Dr ...Recent developments in control, power electronics and renewable energy by Dr ...
Recent developments in control, power electronics and renewable energy by Dr ...Qing-Chang Zhong
 
The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...
The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...
The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...Yusuf Bhujwalla
 
A brief introduction to Hartree-Fock and TDDFT
A brief introduction to Hartree-Fock and TDDFTA brief introduction to Hartree-Fock and TDDFT
A brief introduction to Hartree-Fock and TDDFTJiahao Chen
 
Jylee probabilistic reasoning with bayesian networks
Jylee probabilistic reasoning with bayesian networksJylee probabilistic reasoning with bayesian networks
Jylee probabilistic reasoning with bayesian networksJungyeol
 
Tro07 sparse-solutions-talk
Tro07 sparse-solutions-talkTro07 sparse-solutions-talk
Tro07 sparse-solutions-talkmpbchina
 
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...Advanced-Concepts-Team
 
Signal Processing Course : Sparse Regularization of Inverse Problems
Signal Processing Course : Sparse Regularization of Inverse ProblemsSignal Processing Course : Sparse Regularization of Inverse Problems
Signal Processing Course : Sparse Regularization of Inverse ProblemsGabriel Peyré
 
Jyokyo-kai-20120605
Jyokyo-kai-20120605Jyokyo-kai-20120605
Jyokyo-kai-20120605ketanaka
 

Tendances (20)

Compressed Sensing and Tomography
Compressed Sensing and TomographyCompressed Sensing and Tomography
Compressed Sensing and Tomography
 
Cd Simon
Cd SimonCd Simon
Cd Simon
 
Bayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal modelsBayesian inversion of deterministic dynamic causal models
Bayesian inversion of deterministic dynamic causal models
 
Second Order Perturbations During Inflation Beyond Slow-roll
Second Order Perturbations During Inflation Beyond Slow-rollSecond Order Perturbations During Inflation Beyond Slow-roll
Second Order Perturbations During Inflation Beyond Slow-roll
 
Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...
Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...
Theoretical and computational aspects of the SVM, EBCM, and PMM methods in li...
 
Quantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural NetworksQuantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural Networks
 
Guarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized ComplexityGuarding Terrains though the Lens of Parameterized Complexity
Guarding Terrains though the Lens of Parameterized Complexity
 
Wasserstein GAN
Wasserstein GANWasserstein GAN
Wasserstein GAN
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Fine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsFine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its Variants
 
Recent developments in control, power electronics and renewable energy by Dr ...
Recent developments in control, power electronics and renewable energy by Dr ...Recent developments in control, power electronics and renewable energy by Dr ...
Recent developments in control, power electronics and renewable energy by Dr ...
 
The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...
The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...
The Impact of Smoothness on Model Class Selection in Nonlinear System Identif...
 
Approximate Tree Kernels
Approximate Tree KernelsApproximate Tree Kernels
Approximate Tree Kernels
 
A brief introduction to Hartree-Fock and TDDFT
A brief introduction to Hartree-Fock and TDDFTA brief introduction to Hartree-Fock and TDDFT
A brief introduction to Hartree-Fock and TDDFT
 
Jylee probabilistic reasoning with bayesian networks
Jylee probabilistic reasoning with bayesian networksJylee probabilistic reasoning with bayesian networks
Jylee probabilistic reasoning with bayesian networks
 
Tro07 sparse-solutions-talk
Tro07 sparse-solutions-talkTro07 sparse-solutions-talk
Tro07 sparse-solutions-talk
 
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
 
Collier
CollierCollier
Collier
 
Signal Processing Course : Sparse Regularization of Inverse Problems
Signal Processing Course : Sparse Regularization of Inverse ProblemsSignal Processing Course : Sparse Regularization of Inverse Problems
Signal Processing Course : Sparse Regularization of Inverse Problems
 
Jyokyo-kai-20120605
Jyokyo-kai-20120605Jyokyo-kai-20120605
Jyokyo-kai-20120605
 

Similaire à Security of continuous variable quantum key distribution against general attacks

Chapter 3 projection
Chapter 3 projectionChapter 3 projection
Chapter 3 projectionNBER
 
Threshold network models
Threshold network modelsThreshold network models
Threshold network modelsNaoki Masuda
 
MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...
MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...
MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...Chiheb Ben Hammouda
 
ABC based on Wasserstein distances
ABC based on Wasserstein distancesABC based on Wasserstein distances
ABC based on Wasserstein distancesChristian Robert
 
Introduction to Formal Argumentation Theory
Introduction to Formal Argumentation TheoryIntroduction to Formal Argumentation Theory
Introduction to Formal Argumentation TheoryFederico Cerutti
 
Slides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingSlides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingFrank Nielsen
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via MeshingDon Sheehy
 
從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論岳華 杜
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking componentsChristian Robert
 
ABC with Wasserstein distances
ABC with Wasserstein distancesABC with Wasserstein distances
ABC with Wasserstein distancesChristian Robert
 
Patch Matching with Polynomial Exponential Families and Projective Divergences
Patch Matching with Polynomial Exponential Families and Projective DivergencesPatch Matching with Polynomial Exponential Families and Projective Divergences
Patch Matching with Polynomial Exponential Families and Projective DivergencesFrank Nielsen
 
Slides: Hypothesis testing, information divergence and computational geometry
Slides: Hypothesis testing, information divergence and computational geometrySlides: Hypothesis testing, information divergence and computational geometry
Slides: Hypothesis testing, information divergence and computational geometryFrank Nielsen
 
Multiple estimators for Monte Carlo approximations
Multiple estimators for Monte Carlo approximationsMultiple estimators for Monte Carlo approximations
Multiple estimators for Monte Carlo approximationsChristian Robert
 
Clustering Based Approach Extracting Collocations
Clustering Based Approach Extracting CollocationsClustering Based Approach Extracting Collocations
Clustering Based Approach Extracting CollocationsBEN MOHAMED Mohamed Achraf
 
CommunicationComplexity1_jieren
CommunicationComplexity1_jierenCommunicationComplexity1_jieren
CommunicationComplexity1_jierenjie ren
 
[KHBM] Application of network analysis based on cortical thickness to obsessi...
[KHBM] Application of network analysis based on cortical thickness to obsessi...[KHBM] Application of network analysis based on cortical thickness to obsessi...
[KHBM] Application of network analysis based on cortical thickness to obsessi...Seung-Goo Kim
 

Similaire à Security of continuous variable quantum key distribution against general attacks (20)

Chapter 3 projection
Chapter 3 projectionChapter 3 projection
Chapter 3 projection
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Threshold network models
Threshold network modelsThreshold network models
Threshold network models
 
QMC: Operator Splitting Workshop, Compactness Estimates for Nonlinear PDEs - ...
QMC: Operator Splitting Workshop, Compactness Estimates for Nonlinear PDEs - ...QMC: Operator Splitting Workshop, Compactness Estimates for Nonlinear PDEs - ...
QMC: Operator Splitting Workshop, Compactness Estimates for Nonlinear PDEs - ...
 
MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...
MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...
MCQMC 2020 talk: Importance Sampling for a Robust and Efficient Multilevel Mo...
 
ABC based on Wasserstein distances
ABC based on Wasserstein distancesABC based on Wasserstein distances
ABC based on Wasserstein distances
 
Introduction to Formal Argumentation Theory
Introduction to Formal Argumentation TheoryIntroduction to Formal Argumentation Theory
Introduction to Formal Argumentation Theory
 
Slides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingSlides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processing
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via Meshing
 
Richard Everitt's slides
Richard Everitt's slidesRichard Everitt's slides
Richard Everitt's slides
 
從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論
 
Testing for mixtures by seeking components
Testing for mixtures by seeking componentsTesting for mixtures by seeking components
Testing for mixtures by seeking components
 
ABC with Wasserstein distances
ABC with Wasserstein distancesABC with Wasserstein distances
ABC with Wasserstein distances
 
Patch Matching with Polynomial Exponential Families and Projective Divergences
Patch Matching with Polynomial Exponential Families and Projective DivergencesPatch Matching with Polynomial Exponential Families and Projective Divergences
Patch Matching with Polynomial Exponential Families and Projective Divergences
 
Slides: Hypothesis testing, information divergence and computational geometry
Slides: Hypothesis testing, information divergence and computational geometrySlides: Hypothesis testing, information divergence and computational geometry
Slides: Hypothesis testing, information divergence and computational geometry
 
Multiple estimators for Monte Carlo approximations
Multiple estimators for Monte Carlo approximationsMultiple estimators for Monte Carlo approximations
Multiple estimators for Monte Carlo approximations
 
the ABC of ABC
the ABC of ABCthe ABC of ABC
the ABC of ABC
 
Clustering Based Approach Extracting Collocations
Clustering Based Approach Extracting CollocationsClustering Based Approach Extracting Collocations
Clustering Based Approach Extracting Collocations
 
CommunicationComplexity1_jieren
CommunicationComplexity1_jierenCommunicationComplexity1_jieren
CommunicationComplexity1_jieren
 
[KHBM] Application of network analysis based on cortical thickness to obsessi...
[KHBM] Application of network analysis based on cortical thickness to obsessi...[KHBM] Application of network analysis based on cortical thickness to obsessi...
[KHBM] Application of network analysis based on cortical thickness to obsessi...
 

Plus de wtyru1989

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperialwtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementwtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formationwtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rarewtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementwtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectorswtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theorywtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlwtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theoremwtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codeswtyru1989
 
标量量化
标量量化标量量化
标量量化wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012wtyru1989
 

Plus de wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 

Dernier

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Dernier (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Security of continuous variable quantum key distribution against general attacks

  • 1. Security of continuous-variable quantum key distribution against general attacks arXiv: 1208.4920 Anthony Leverrier (ETH Zürich) with Raúl García-Patrón, Renato Renner and Nicolas J. Cerf QCRYPT 2012
  • 2. Quantum Key Distribution with continuous variables What’s different? Alice encodes information on the quadratures (X , P) of the EM field Bob measures with an homodyne (interferometric) detection Grosshans et al., Nature 421 238 (2003) Features no need for single-photon counters compatible with WDM Bing Qi et al. NJP 12 103042 (2010) "Gaussian Quantum Information" C. Weedbrook et al, RMP 84 621 (2012) Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 3. Many protocols Four Gaussian entangled protocols √ ∞ 1 Alice prepares N EPR pairs |Ψ = 1 − x2 n=0 x n |n, n 2 for each pair, she keeps one mode and sends the other one to Bob 3 Alice and Bob perform either homodyne or heterodyne detection homodyne = measuring X OR P heterodyne = measuring X AND P (with higher noise) Prepare and measure versions homodyne meas. for Alice ⇔ preparation of a squeezed state heterodyne meas. for Alice ⇔ preparation of a coherent state Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 4. Description of the protocol A and B measure ρn with homodyne/hererodyne detection AB Alice obtains x = (x1 , x2 , · · · xn ) ∈ R n Bob obains y = (y1 , y2 , · · · , yn ) ∈ R n (Reverse) reconciliation: Bob sends some information to Alice who ˆ guesses y Privacy amplification: Alice and Bob apply some hash function and obtain (SA , SB ) plus some transcript C of all classical information QKD protocol: map E E : ρn −→ (SA , SB , C) AB Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 5. Experimental implementations in fiber: Qi el al, PRA (2007), Lodewyck et al, PRA (2007), Fossier et al, NJP (2009), Xuan et al, Opt Exp (2009) · · · in free space: S. Tokunaga et al, CLEO (2007), D. Elser et al, NJP (2010), B. Heim et al, APL (2010) · · · with an entangled source T. Eberle et al, arXiv preprint (2011), L. Madsen et al, arXiv preprint (2011) Reliable technology field test during more than 6 months over around 20 km P. Jouguet et al. Opt Expr 20 14030 (2012) Long distance Current record: over 80 km! ⇒ see P. Jouguet’s talk on Friday! What about security? Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 6. Security proofs for CV QKD (before 2012) OK · · · in the asymptotic limit de Finetti theorem for infinite-dimensional quantum systems ⇒ collective attacks are asymptotically optimal R.Renner, J.I. Cirac, PRL (2008) Gaussian attacks are asymptotically optimal among collective attacks R.García-Patrón, N.J. Cerf PRL (2006) M. Navascués, F. Grosshans, A. Acín PRL (2006) Problems de Finetti useless in practical settings: convergence is too slow parameter estimation is problematic for CVQKD (unbounded variables) Two solutions 1 Entropic uncertainty relation: Hmin (X |E) + Hmax (P|B) ≥ N log c(δ) F. Furrer et al, PRL 109 100502 (2012) ⇒ see Fabian’s talk on Friday! combining the postselection technique (M. Christandl et al, PRL 2009) with symmetries in phase space ⇒ this talk Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 7. Security definition A protocol E is secure if it is undistinguishable from an ideal protocol F : ρn −→ (S, S, C): AB F outputs the same key S for Alice and Bob S is uniformly distributed over the set of keys and uncorrelated with Eve’s quantum state: 1 ρSE = |s1 , · · · , sk s1 , · · · , sk | ⊗ ρE . 2k For instance, F = S ◦ E where S replaces (SA , SB ) by a perfect key (S, S). -security: ||E − F || ≤ ⇒ the advantage in distinguishing E from F is less than . ||E − F|| := sup (E − F) ⊗ idK (ρABE ) 1 ρABE How to compute the diamond norm? If the maps are permutation invariant: postselection technique M. Christandl, R. König, R. Renner, PRL 2009 · · · but only for finite dimension Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 8. The postselection technique For protocol invariant under permutations: Theorem [Christandl et al.] 2 −1 ||E−F|| ≤ (n+1)d ||(E−F)⊗id(τHR )||1 where d = dim(HA ⊗ HB ) ≡ τHR is a purification of ⊗n τH = σH µ(σH ) ||(E − F) ⊗ id(τHR )||1 is exponentially small for protocols secure against collective attacks Security against collective attacks implies security against general attacks if the protocol is permutation invariant the dimension of HA ⊗ HB is finite Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 9. Dealing with infinite dimension Two ideas 1 We prepend a test T to the protocol: if the test succeeds, Alice and Bob continue with the usual protocol otherwise they abort The goal of the test is to make sure that the state ρn contains not too AB many photons, i.e. is close to a finite dimensional state. 2 The permutation symmetry is not sufficient for the test: ⇒ we exploit symmetries in phase space specific to CV QKD. Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 10. Sketch of the proof Some notations E0 : ρn → (SA , SB , C): the usual protocol, secure against collective AB attacks; and F0 := S ◦ E0 the ideal version a test T : ρN → ρn ⊗ {pass/fail} with N > n AB AB a projection P : (HA ⊗ HB )⊗n → (HA ⊗ HB )⊗n with HA := Span(|0 , · · · , |dA − 1 ); dim(HA ) = dA < ∞ HB := Span(|0 , · · · , |dB − 1 ); dim(HB ) = dB < ∞ the new protocol of interest: E := E0 ◦ T : ρN → (SA , SB , C) AB ||E − F || ≤ ||E0 PT − F0 PT || + ||E − E0 PT || + ||F − F0 PT || = ||E0 PT − F0 PT || + ||E0 ◦ (id − P) ◦ T || + ||F0 ◦ (id − P) ◦ T || ≤ ||E0 PT − F0 PT || + 2||(id − P) ◦ T || Postselection technique small for a "good" test Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 11. How to choose the test T ? Note: because Eve does not interact with Alice’s state, it is sufficient to apply the test on Bob’s state ρN . B Goal: find T such that ||(id − P) ◦ T || ≤ , i.e. Prob [passing the test] AND max mk ≥ dB ≤ k where mk is the result of a photon counting measurement of mode k of ρn . B Idea: photon counting ≈ energy measurement ≈ heterodyne detection T should be easy to implement: one measures m := N − n modes with heterodyne detection: results: z = (z1 , z2 , · · · , z2m ) given z, pass or fail Permutation symmetry is not sufficient In fact, even independence is not sufficient. Ex: ρN = σ ⊗N with σ = (1 − δ)|0 0| + δ|N N|. The probability of passing the test is large, but the projection will fail if δ = O(1/N). Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 12. Transformations in phase space U ∼ U(n): group generated by phase shifts and beamsplitters = ⇒ act like orthogonal transformations in phase space. Action of phase shits and beamsplitters on n modes There exists U ∈ U(n): V = Re(U) and W = −Im(U) a → Ua; a† → U ∗ a† X V W X → P −W V P ⇒ U commutes with a heterodyne detection Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 13. Symmetry in phase space For any linear passive transformation in phase space U (corresponding to a network of beamsplitters and phase shifts), there exists an orthogonal R transformation in 2N such that: One can assume that ∗ ρN is invariant under UA ⊗ UB AB UρN U † = ρN B B ∀U. ⇒ ρN B = n k =0 λk σk ≡ n 1 σk = n+k −1 |k1 · · · kN k1 · · · kN | k k1 +···+kN =k ρN is a mixture of generalized N-mode B Fock states ⇒ very unlikely to pass the test and fail the projection P R The vector (X, P) ∈ 2n is uniformly distributed on the sphere of radius ||X||2 + ||P||2 ⇒ concentration of measure on the sphere. Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 14. The test Bob computes: 2 2 2 Z := y2n+1 + y2n+2 + · · · + y2N If Z ≤ (N − n)Ztest , Alice and Bob continue otherwise, they abort Concentration of measure: 2 2 Prob [test succeeds] AND y1 + · · · + y2n ≥ n (Ztest + δ) ≤ Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 15. The test Bob computes: 2 2 2 Z := y2n+1 + y2n+2 + · · · + y2N If Z ≤ (N − n)Ztest , Alice and Bob continue otherwise, they abort Concentration of measure: 2 2 Prob [test succeeds] AND y1 + · · · + y2n ≥ n (Ztest + δ) ≤ Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 16. Sketch of the proof n Prob [pass test] AND i=1 Xi2 + Pi2 ≥ C1 n ≤ test n Prob [pass test] AND i=1 ˆ ni ≥ C2 n ≤ test ˆ n Prob [pass test] AND max ni ≥ C3 log test ≤ test for some explicit constants C1 , C2 , C3 Putting all together n choose dA , dB = O log test postselection technique: if E0 is 0 -secure against collective attacks, then E is -secure against general attacks with O (log4 (n/ test )) = 02 +2 test . ok because one can take 0 = 2−cn . Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks
  • 17. Conclusion Summary We show that collective attacks are optimal for Gaussian protocols thanks to two ideas prepending an test to the usual protocol to truncate the Hilbert space permutation symmetry is not sufficient to prove security: one needs rotation invariance in phase space Open questions Our proof is somewhat suboptimal: first, we truncate, then we use the finite-dimensional postselection technique Can we generalize the technique for maps which are symmetric in phase space? Same question for de Finetti theorem (only partial results are known) Anthony Leverrier (ETH Zürich) Security of CVQKD against general attacks