SlideShare une entreprise Scribd logo
1  sur  57
Télécharger pour lire hors ligne
Intro.   Cont. Var.       Information Theory    CVQKD   XP   Next




                       Continuous Variable
                      Quantum Cryptography
         Towards High Speed Quantum Cryptography


                          Frédéric Grosshans




                            CNRS / ENS Cachan




                  Palacký University, Olomouc, 2011
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.         Cont. Var.   Information Theory   CVQKD   XP   Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
Intro.         Cont. Var.   Information Theory   CVQKD   XP        Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
                              through a channel observed by Eve.
Intro.         Cont. Var.   Information Theory   CVQKD   XP        Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
                              through a channel observed by Eve.




         She encrypts the message with a secret key
Intro.         Cont. Var.   Information Theory   CVQKD   XP        Next




Conditions for Perfect Secrecy

         Alice sends a secret message to Bob
                              through a channel observed by Eve.




         She encrypts the message with a secret key
                                         as long as the message.
Intro.         Cont. Var.   Information Theory   CVQKD   XP   Next




Quantum Key Distribution

         Alice sends quantum objects to Bob
Intro.         Cont. Var.     Information Theory   CVQKD   XP   Next




Quantum Key Distribution

         Alice sends quantum objects to Bob




         Eve’s Measurenents
Intro.         Cont. Var.   Information Theory   CVQKD   XP      Next




Quantum Key Distribution

         Alice sends quantum objects to Bob




         Eve’s Measurenents ⇒ measurable perturbations
                                       ⇒ secret key generation
Intro.         Cont. Var.    Information Theory   CVQKD   XP   Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s)
Intro.         Cont. Var.    Information Theory   CVQKD   XP       Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
Intro.         Cont. Var.    Information Theory   CVQKD   XP       Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
Intro.         Cont. Var.     Information Theory   CVQKD   XP      Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
                 1 CD / year = 180 bits/s
Intro.         Cont. Var.     Information Theory     CVQKD   XP    Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
                 1 CD / year = 180 bits/s
                 1 iPod (160 GB)/ year = 40 kbit/s
Intro.         Cont. Var.     Information Theory     CVQKD   XP    Next




Unconditionnally Secure Systems . . .


         Single Photon QKD
            Long Range (∼ 100 km)
            Low rate (kbit/s) maybe a few Mbit/s in the long run
         Classical One-Time-Pad
            Very Long Range (Paris–Olomouc)
            Not so small rate :
                 1 CD / year = 180 bits/s
                 1 iPod (160 GB)/ year = 40 kbit/s
            But the data has to stay here
Intro.     Cont. Var.   Information Theory   CVQKD   XP   Next




. . . and Continuous Variable

         Medium Range :∼ 25 km
         Medium Rate :∼ a few kbit/s
Intro.     Cont. Var.   Information Theory   CVQKD   XP   Next




. . . and Continuous Variable

         Medium Range :∼ 25 km
         Medium Rate :∼ a few kbit/s
         Much less mature
Intro.     Cont. Var.   Information Theory   CVQKD      XP   Next




. . . and Continuous Variable

         Medium Range :∼ 25 km ; 80 km soon ?
         Medium Rate :∼ a few kbit/s ; Mbits/s soon ?
         Much less mature ⇒ Much room for improvements
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.       Cont. Var.     Information Theory   CVQKD   XP   Next




Field quadratures

    Classical field
    Electromagnetic field
    described by QA and PA
    E(t) = QA cos ωt + PA sin ωt
Intro.       Cont. Var.     Information Theory   CVQKD   XP   Next




Field quadratures

    Classical field
    Electromagnetic field
    described by QA and PA
    E(t) = QA cos ωt + PA sin ωt

    Quantum description
    Q and P do not commute:
                       [Q, P] ∝ i .
    Add a
               “quantum noise”:
      Q = QA + BQ et P = PA + BP
    Heisenberg =⇒ ∆BQ ∆BP ≥ 1
Intro.   Cont. Var.   Information Theory         CVQKD          XP            Next




Homodyne Detection : Theory


                        Photocurrents:

                              i± ∝ (Eosc. (t) ± Esignal (t))2
                                    ∝ Eosc. (t)2 ± 2Eosc. (t)Esignal (t)

                         after substraction:

                         δi ∝ Eosc. (t)Esignal (t)
                               ∝      Eosc. (Qsignal cos ϕ + Psignal sin ϕ)
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.         Cont. Var.   Information Theory   CVQKD   XP       Next




XXth century CVQKD


         At the end of XXth century it was obvious that a
         generalization of QKD to continuous variables could be
         interesting.
         Problem : discrete bits continuous variable
Intro.         Cont. Var.   Information Theory   CVQKD   XP       Next




XXth century CVQKD


         At the end of XXth century it was obvious that a
         generalization of QKD to continuous variables could be
         interesting.
         Problem : discrete bits continuous variable



    Adapting BB84?
    Mark Hillery, “Quantum Cryptography with
    Squeezed States”,
    arXiv:quant-ph/9909006/PRA 61 022309
Intro.         Cont. Var.   Information Theory   CVQKD   XP       Next




XXth century CVQKD


         At the end of XXth century it was obvious that a
         generalization of QKD to continuous variables could be
         interesting.
         Problem : discrete bits continuous variable


    Natural modulation + information theory!
    Nicolas J. Cerf, Marc Lévy, Gilles Van
    Assche : “Quantum distribution of Gaussian
    keys using squeezed states”,
    arXiv:quant-ph/0008058/PRL 63 052311
Intro.         Cont. Var.   Information Theory   CVQKD     XP   Next




Where are the bits ?



         Quite frequent discussion with discrete quantum
         cryptographers :
             DQC : How do you encode a 0 or a 1 in CVQKD?
               Me : I don’t care, C. E. Shannon tells me
                    “∀ε > 0, ∃ code of rate I − ε.”
Intro.         Cont. Var.   Information Theory   CVQKD     XP       Next




Where are the bits ?


         Quite frequent discussion with discrete quantum
         cryptographers :
             DQC : How do you encode a 0 or a 1 in CVQKD?
               Me : Gilles/Jérôme/Anthony/Sébastien developed
                    a really efficient code, using sliced
                    reconciliation/LDPC matrices/R8 rotations and
                    octonions. Only he knows how it works.
Intro.         Cont. Var.   Information Theory   CVQKD     XP       Next




Where are the bits ?


         Quite frequent discussion with discrete quantum
         cryptographers :
             DQC : How do you encode a 0 or a 1 in CVQKD?
               Me : Gilles/Jérôme/Anthony/Sébastien developed
                    a really efficient code, using sliced
                    reconciliation/LDPC matrices/R8 rotations and
                    octonions. Only he knows how it works.

         Computation of the ideal code performance is easy !
Intro.         Cont. Var.    Information Theory   CVQKD   XP   Next




They’re hidden
         Availaible informationin a continuous signal
Intro.          Cont. Var.       Information Theory   CVQKD   XP   Next




They’re hidden
         Availaible informationin a continuous signal




    Differential entropy

         H(X) = −      P(x) dx log P(x) dx
           dx P(x) log P(x) − log dx

              H(X)             constante
Intro.          Cont. Var.       Information Theory         CVQKD       XP         Next




They’re hidden
         Availaible informationin a continuous signal
                                                                    with noise ?




    Differential entropy

         H(X) = −      P(x) dx log P(x) dx            H(X) = log ∆X + constante
           dx P(x) log P(x) − log dx

              H(X)             constante
Intro.          Cont. Var.       Information Theory          CVQKD             XP          Next




They’re hidden
         Availaible informationin a continuous signal
                                                                            with noise ?




    Differential entropy                              Mutual information
                                                      I(X : Y) = H(Y) − H(Y|X)
         H(X) = −      P(x) dx log P(x) dx
                                                             = H(Y) − H(Y|X)
           dx P(x) log P(x) − log dx
                                                                            ∆Y2
                                                             =   1
                                                                     log
              H(X)             constante                         2
                                                                           ∆Y2 |X
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.          Cont. Var.      Information Theory   CVQKD   XP   Next




The spy’s power



         Heisenberg :
              ∆BEve ∆BBob ≥ 1
Intro.          Cont. Var.      Information Theory   CVQKD   XP   Next




The spy’s power



         Heisenberg :
              ∆BEve ∆BBob ≥ 1




         ⇒ ∆BBob gives           IEve
                                 IBob
Intro.         Cont. Var.    Information Theory   CVQKD      XP         Next




Quantum Key Distribution Protocols

         Channel Evauation                            (noise measure)
         Alice&Bob evaluate IEve
Intro.         Cont. Var.    Information Theory   CVQKD       XP          Next




Quantum Key Distribution Protocols

         Channel Evauation                            (noise measure)
         Alice&Bob evaluate IEve


         Reconciliation                              (error correction)
         Alice&Bob share IBob identical bits.
                Ève knows IEve .
Intro.         Cont. Var.    Information Theory   CVQKD         XP          Next




Quantum Key Distribution Protocols

         Channel Evauation                              (noise measure)
         Alice&Bob evaluate IEve


         Reconciliation                                (error correction)
         Alice&Bob share IBob identical bits.
                Ève knows IEve .


         Privacy Amplification
         Alice&Bob share IBob − IEve identical bits.
                Ève knows ∼ 0.
Intro.         Cont. Var.   Information Theory   CVQKD   XP    Next




Theoretical Progresses in the last 10 years

         We went from a protocol
            using squeezed states,
            insecure beyond 50% losses (15 km),
            proved secure against Gaussian individual attack
Intro.         Cont. Var.   Information Theory   CVQKD   XP     Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
Intro.         Cont. Var.   Information Theory   CVQKD   XP     Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
             with no fundamental range limit
             proved secure against collective attacks
Intro.         Cont. Var.    Information Theory   CVQKD   XP    Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
             with no fundamental range limit
             proved secure against collective attacks
             likely secure against coherent attacks
Intro.         Cont. Var.    Information Theory   CVQKD   XP    Next




Theoretical Progresses in the last 10 years

         We went from a protocol
             using squeezed states,
             insecure beyond 50% losses (15 km),
             proved secure against Gaussian individual attack
         to a protocol
             using coherent states
             with no fundamental range limit
             proved secure against collective attacks
             likely secure against coherent attacks
             and experimentally working
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.         Cont. Var.    Information Theory   CVQKD     XP   Next




1st generation demonstrator
F. Grosshans et. al., Nature (2003) & Brevet US




         m

         Key rate           75 kbit/s 3.1 dB (51%) losses
                            1.7 Mbit/s without losses
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integrated system
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integrated system
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integrated system
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Key-Rates
Intro.              Cont. Var.          Information Theory                          CVQKD        XP        Next




Key-Rates


                                                          SECOQC Performance
         100 kb/s
                                                               (2008)

                                                                L
                                                           Exce osses o
                                                                ss n      n
                                                       95%           oise ly
                                                           effi
                                       90

                                                               cie
                                         %

                                                                  nt c
                                             eff

                                                                       ode
                                                ici

          10 kb/s                     Slo
                                                    en
                                                       t

                                         w
                                                        co

                                             co
                                                          de

                                                  de




           1 kb/s
                    0k




                                 10




                                                        20




                                                                           30




                                                                                            40




                                                                                                      50
                                 km




                                                          km




                                                                               km




                                                                                            km




                                                                                                      km
                    m
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Key-Rates
Intro.                 Cont. Var.                        Information Theory                          CVQKD             XP        Next




Key-Rates


                                                                           SECOQC Performance
         100 kb/s
                                                                                (2008)

                                                                                 L
                                                                            Exce osses o
                                                                                 ss n      n
                                                                        95%           oise ly
                    Increases modulation rate :




                                                                            effi
                                                        90

                                                                                cie
                       ×10 easy, ×100 doable




                                                          %

                                                                                   nt c
                                                              eff

                                                                                        ode
                                                                 ici

          10 kb/s                                      Slo
                                                                     en
                                                                        t

                                                          w
                                                                         co

                                                              co
                                                                           de

                                                                   de                              use modern codes :
                                                                                                ocotonion based protocol
                                                                         us




                                                                                                +multi-edge LDPC codes
                                                                           eG




                                                                                                   + repetition codes
                                                                              PU
                                                                                s




           1 kb/s
                    0k




                                                  10




                                                                         20




                                                                                            30




                                                                                                              40




                                                                                                                            50
                                                  km




                                                                           km




                                                                                                km




                                                                                                               km




                                                                                                                            km
                          m
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integration with classical cryptography
Intro.   Cont. Var.   Information Theory   CVQKD   XP   Next




Integration with classical cryptography
Intro.          Cont. Var.   Information Theory   CVQKD   XP   Next



         1   Introduction
                Prefect Secrecy and Quantum Cryptography
                Various Secure Systems
         2   Continuous variables
                Field quadratures
                Homodyne Detection : Theory
         3   Information Theory
                XXth century CVQKD
                Where are the bits ?
         4   Continuous Variable Quantum Key Distribution
                Spying
                Protocols
         5   Experimental systems
                1st and 2nd generation demonstrators
                Key-Rates
                Integration with classical cryptography
         6   Open problems
Intro.      Cont. Var.     Information Theory   CVQKD   XP     Next




Open Problems




         Finite size effects
         Link with post-selection based protocols (.de, .au)
         Side-channels and quantum hacking
         Other cryptographic applications

Contenu connexe

Tendances

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 

Tendances (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum gates
Quantum gatesQuantum gates
Quantum gates
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerQuantum Knowledge Proofs and Post Quantum Cryptography - A Primer
Quantum Knowledge Proofs and Post Quantum Cryptography - A Primer
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Information with Continuous Variable systems
Quantum Information with Continuous Variable systemsQuantum Information with Continuous Variable systems
Quantum Information with Continuous Variable systems
 
Quantum Cost Calculation of Reversible Circuit
Quantum Cost Calculation of Reversible CircuitQuantum Cost Calculation of Reversible Circuit
Quantum Cost Calculation of Reversible Circuit
 

Similaire à Continuous variables quantum cryptography

Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
ranjan954354
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Nikhil Eg
 

Similaire à Continuous variables quantum cryptography (20)

DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
 
Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
 
QCrypt
QCryptQCrypt
QCrypt
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practiceNSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
NSC #2 - D1 05 - Renaud Lifchitz - Quantum computing in practice
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
SW/HW co-design for near-term quantum computing
SW/HW co-design for near-term quantum computingSW/HW co-design for near-term quantum computing
SW/HW co-design for near-term quantum computing
 
Overview of Photonics Research at Calit2: Scaling from Nanometers to the Earth
Overview of Photonics Research at Calit2: Scaling from Nanometers to the EarthOverview of Photonics Research at Calit2: Scaling from Nanometers to the Earth
Overview of Photonics Research at Calit2: Scaling from Nanometers to the Earth
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computation: past-now-future - 2021-06-19
Quantum computation: past-now-future - 2021-06-19Quantum computation: past-now-future - 2021-06-19
Quantum computation: past-now-future - 2021-06-19
 

Plus de wtyru1989

Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
wtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
wtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
wtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
wtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
wtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
wtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
wtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
wtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
wtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
wtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
wtyru1989
 

Plus de wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Continuous variables quantum cryptography

  • 1. Intro. Cont. Var. Information Theory CVQKD XP Next Continuous Variable Quantum Cryptography Towards High Speed Quantum Cryptography Frédéric Grosshans CNRS / ENS Cachan Palacký University, Olomouc, 2011
  • 2. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 3. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob
  • 4. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob through a channel observed by Eve.
  • 5. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob through a channel observed by Eve. She encrypts the message with a secret key
  • 6. Intro. Cont. Var. Information Theory CVQKD XP Next Conditions for Perfect Secrecy Alice sends a secret message to Bob through a channel observed by Eve. She encrypts the message with a secret key as long as the message.
  • 7. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Alice sends quantum objects to Bob
  • 8. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Alice sends quantum objects to Bob Eve’s Measurenents
  • 9. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Alice sends quantum objects to Bob Eve’s Measurenents ⇒ measurable perturbations ⇒ secret key generation
  • 10. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s)
  • 11. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run
  • 12. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate :
  • 13. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate : 1 CD / year = 180 bits/s
  • 14. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate : 1 CD / year = 180 bits/s 1 iPod (160 GB)/ year = 40 kbit/s
  • 15. Intro. Cont. Var. Information Theory CVQKD XP Next Unconditionnally Secure Systems . . . Single Photon QKD Long Range (∼ 100 km) Low rate (kbit/s) maybe a few Mbit/s in the long run Classical One-Time-Pad Very Long Range (Paris–Olomouc) Not so small rate : 1 CD / year = 180 bits/s 1 iPod (160 GB)/ year = 40 kbit/s But the data has to stay here
  • 16. Intro. Cont. Var. Information Theory CVQKD XP Next . . . and Continuous Variable Medium Range :∼ 25 km Medium Rate :∼ a few kbit/s
  • 17. Intro. Cont. Var. Information Theory CVQKD XP Next . . . and Continuous Variable Medium Range :∼ 25 km Medium Rate :∼ a few kbit/s Much less mature
  • 18. Intro. Cont. Var. Information Theory CVQKD XP Next . . . and Continuous Variable Medium Range :∼ 25 km ; 80 km soon ? Medium Rate :∼ a few kbit/s ; Mbits/s soon ? Much less mature ⇒ Much room for improvements
  • 19. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 20. Intro. Cont. Var. Information Theory CVQKD XP Next Field quadratures Classical field Electromagnetic field described by QA and PA E(t) = QA cos ωt + PA sin ωt
  • 21. Intro. Cont. Var. Information Theory CVQKD XP Next Field quadratures Classical field Electromagnetic field described by QA and PA E(t) = QA cos ωt + PA sin ωt Quantum description Q and P do not commute: [Q, P] ∝ i . Add a “quantum noise”: Q = QA + BQ et P = PA + BP Heisenberg =⇒ ∆BQ ∆BP ≥ 1
  • 22. Intro. Cont. Var. Information Theory CVQKD XP Next Homodyne Detection : Theory Photocurrents: i± ∝ (Eosc. (t) ± Esignal (t))2 ∝ Eosc. (t)2 ± 2Eosc. (t)Esignal (t) after substraction: δi ∝ Eosc. (t)Esignal (t) ∝ Eosc. (Qsignal cos ϕ + Psignal sin ϕ)
  • 23. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 24. Intro. Cont. Var. Information Theory CVQKD XP Next XXth century CVQKD At the end of XXth century it was obvious that a generalization of QKD to continuous variables could be interesting. Problem : discrete bits continuous variable
  • 25. Intro. Cont. Var. Information Theory CVQKD XP Next XXth century CVQKD At the end of XXth century it was obvious that a generalization of QKD to continuous variables could be interesting. Problem : discrete bits continuous variable Adapting BB84? Mark Hillery, “Quantum Cryptography with Squeezed States”, arXiv:quant-ph/9909006/PRA 61 022309
  • 26. Intro. Cont. Var. Information Theory CVQKD XP Next XXth century CVQKD At the end of XXth century it was obvious that a generalization of QKD to continuous variables could be interesting. Problem : discrete bits continuous variable Natural modulation + information theory! Nicolas J. Cerf, Marc Lévy, Gilles Van Assche : “Quantum distribution of Gaussian keys using squeezed states”, arXiv:quant-ph/0008058/PRL 63 052311
  • 27. Intro. Cont. Var. Information Theory CVQKD XP Next Where are the bits ? Quite frequent discussion with discrete quantum cryptographers : DQC : How do you encode a 0 or a 1 in CVQKD? Me : I don’t care, C. E. Shannon tells me “∀ε > 0, ∃ code of rate I − ε.”
  • 28. Intro. Cont. Var. Information Theory CVQKD XP Next Where are the bits ? Quite frequent discussion with discrete quantum cryptographers : DQC : How do you encode a 0 or a 1 in CVQKD? Me : Gilles/Jérôme/Anthony/Sébastien developed a really efficient code, using sliced reconciliation/LDPC matrices/R8 rotations and octonions. Only he knows how it works.
  • 29. Intro. Cont. Var. Information Theory CVQKD XP Next Where are the bits ? Quite frequent discussion with discrete quantum cryptographers : DQC : How do you encode a 0 or a 1 in CVQKD? Me : Gilles/Jérôme/Anthony/Sébastien developed a really efficient code, using sliced reconciliation/LDPC matrices/R8 rotations and octonions. Only he knows how it works. Computation of the ideal code performance is easy !
  • 30. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal
  • 31. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal Differential entropy H(X) = − P(x) dx log P(x) dx dx P(x) log P(x) − log dx H(X) constante
  • 32. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal with noise ? Differential entropy H(X) = − P(x) dx log P(x) dx H(X) = log ∆X + constante dx P(x) log P(x) − log dx H(X) constante
  • 33. Intro. Cont. Var. Information Theory CVQKD XP Next They’re hidden Availaible informationin a continuous signal with noise ? Differential entropy Mutual information I(X : Y) = H(Y) − H(Y|X) H(X) = − P(x) dx log P(x) dx = H(Y) − H(Y|X) dx P(x) log P(x) − log dx ∆Y2 = 1 log H(X) constante 2 ∆Y2 |X
  • 34. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 35. Intro. Cont. Var. Information Theory CVQKD XP Next The spy’s power Heisenberg : ∆BEve ∆BBob ≥ 1
  • 36. Intro. Cont. Var. Information Theory CVQKD XP Next The spy’s power Heisenberg : ∆BEve ∆BBob ≥ 1 ⇒ ∆BBob gives IEve IBob
  • 37. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Protocols Channel Evauation (noise measure) Alice&Bob evaluate IEve
  • 38. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Protocols Channel Evauation (noise measure) Alice&Bob evaluate IEve Reconciliation (error correction) Alice&Bob share IBob identical bits. Ève knows IEve .
  • 39. Intro. Cont. Var. Information Theory CVQKD XP Next Quantum Key Distribution Protocols Channel Evauation (noise measure) Alice&Bob evaluate IEve Reconciliation (error correction) Alice&Bob share IBob identical bits. Ève knows IEve . Privacy Amplification Alice&Bob share IBob − IEve identical bits. Ève knows ∼ 0.
  • 40. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack
  • 41. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states
  • 42. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states with no fundamental range limit proved secure against collective attacks
  • 43. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states with no fundamental range limit proved secure against collective attacks likely secure against coherent attacks
  • 44. Intro. Cont. Var. Information Theory CVQKD XP Next Theoretical Progresses in the last 10 years We went from a protocol using squeezed states, insecure beyond 50% losses (15 km), proved secure against Gaussian individual attack to a protocol using coherent states with no fundamental range limit proved secure against collective attacks likely secure against coherent attacks and experimentally working
  • 45. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 46. Intro. Cont. Var. Information Theory CVQKD XP Next 1st generation demonstrator F. Grosshans et. al., Nature (2003) & Brevet US m Key rate 75 kbit/s 3.1 dB (51%) losses 1.7 Mbit/s without losses
  • 47. Intro. Cont. Var. Information Theory CVQKD XP Next Integrated system
  • 48. Intro. Cont. Var. Information Theory CVQKD XP Next Integrated system
  • 49. Intro. Cont. Var. Information Theory CVQKD XP Next Integrated system
  • 50. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates
  • 51. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates SECOQC Performance 100 kb/s (2008) L Exce osses o ss n n 95% oise ly effi 90 cie % nt c eff ode ici 10 kb/s Slo en t w co co de de 1 kb/s 0k 10 20 30 40 50 km km km km km m
  • 52. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates
  • 53. Intro. Cont. Var. Information Theory CVQKD XP Next Key-Rates SECOQC Performance 100 kb/s (2008) L Exce osses o ss n n 95% oise ly Increases modulation rate : effi 90 cie ×10 easy, ×100 doable % nt c eff ode ici 10 kb/s Slo en t w co co de de use modern codes : ocotonion based protocol us +multi-edge LDPC codes eG + repetition codes PU s 1 kb/s 0k 10 20 30 40 50 km km km km km m
  • 54. Intro. Cont. Var. Information Theory CVQKD XP Next Integration with classical cryptography
  • 55. Intro. Cont. Var. Information Theory CVQKD XP Next Integration with classical cryptography
  • 56. Intro. Cont. Var. Information Theory CVQKD XP Next 1 Introduction Prefect Secrecy and Quantum Cryptography Various Secure Systems 2 Continuous variables Field quadratures Homodyne Detection : Theory 3 Information Theory XXth century CVQKD Where are the bits ? 4 Continuous Variable Quantum Key Distribution Spying Protocols 5 Experimental systems 1st and 2nd generation demonstrators Key-Rates Integration with classical cryptography 6 Open problems
  • 57. Intro. Cont. Var. Information Theory CVQKD XP Next Open Problems Finite size effects Link with post-selection based protocols (.de, .au) Side-channels and quantum hacking Other cryptographic applications