Conference PaperPDF Available

Secret Key Sharing Using Entanglement Swapping and Remote Preparation of Quantum State

Authors:

Abstract and Figures

In this paper we propose a new algorithm for secret key sharing by utilizing quantum entanglement swapping and remote preparation of quantum state. This algorithm is used when two parties do not share an Einstein-Podolsky-Rosen (EPR) pair but one wishes to transmit a secret key to the other. In order to successfully accomplish this process, a third party who shares an EPR pair with both parties will help them build a new EPR pair. The new EPR pair will be used between the sender and the receiver to remotely prepare a quantum state. This process will provide a secure way to share secret keys between the two parties who do not share EPR pairs. Furthermore, the process doesn't require sending any physical quantum state, instead the sender prepares a known state and sends only one classical bit to the receiver to help build an intended quantum state.
Content may be subject to copyright.
Secret Key Sharing Using Entanglement Swapping
and Remote Preparation of Quantum State
Muneer Alshowkan, IEEE Student Member
Department of Computer Science and Engineering
University of Bridgeport University of Bridgeport
Bridgeport, USA
malshowk@bridgeport.edu
Khaled Elleithy, IEEE Senior Member
Department of Computer Science and Engineering
University of Bridgeport University of Bridgeport
Bridgeport, USA
elleithy@bridgeport.edu
AbstractIn this paper we propose a new algorithm for secret
key sharing by utilizing quantum entanglement swapping and
remote preparation of quantum state. This algorithm is used
when two parties do not share an Einstein-Podolsky-Rosen (EPR)
pair but one wishes to transmit a secret key to the other. In order
to successfully accomplish this process, a third party who shares
an EPR pair with both parties will help them build a new EPR
pair. The new EPR pair will be used between the sender and the
receiver to remotely prepare a quantum state. This process will
provide a secure way to share secret keys between the two parties
who do not share EPR pairs. Furthermore, the process doesn’t
require sending any physical quantum state, instead the sender
prepares a known state and sends only one classical bit to the
receiver to help build an intended quantum state.
Keywords- remote preparation; quantum cryptography; EPR
pairs; entangelemt swapping; secret key sharing;
I. INTRODUCTION
Quantum computing and quantum information theory have
been providing promising solutions using quantum
parallelism, teleportation and entanglement to efficiently solve
difficult problems in classical computing [1-4]. Data and
network security are of the most challenges in classical
computing. Providing that, many quantum protocols have
been proposed based on quantum entanglement to improve
and provide more secure systems [5-10]. Moreover, quantum
teleportation depends on quantum entanglement and it is one
of the most important protocols for data transmission.
Quantum teleportation is used to transmit an arbitrary
unknown state from a sender (Alice) to receiver (Bob) with a
spatial distance between them, using a quantum entanglement
channel. However, a classical communication channel
between the sender and the receiver will be required to help in
transmitting and measuring the target state. In fact, in
quantum teleportation the quantum state gets moved to a
remote place while the original state gets eliminated because,
the no-cloning theorem states that it is impossible to copy a
quantum state [11].
Moreover, the teleportation process requires two kinds of
channels; one being the quantum channel and the other the
classical channel. Considering, an eavesdropper could try to
make malicious activities on the transmission path. For this
reason, such path might not be secure for sending and
receiving data.[12, 13]. An interesting algorithm to transmit a
known pure quantum state by taking the advantage of prior
shared entanglement is known as remote state preparation
(RSP). RSP was presented by Lo [14]. Further, RSP is
similar to teleportation as in both algorithms entanglement
state and classical channel are required to successfully send
and receive the quantum state. However, the major difference
between them is in RSP, Alice knows the state she intends to
send to Bob. And the physical state in RSP is not required to
be sent. Where in teleportation, no one knows the state being
transmitted from and the quantum channel will be required to
send the physical state. Furthermore, RSP was proved to be
more economically efficient than teleportation by Pati [15].
Because using teleportation requires Alice to send two
classical bits for each qubit she sends to Bob to help him
figure the state while in RSP it only requires one classical bit
for each qubit.
The trade-off in cost between the classical information
required entanglement and RSP was provided by Bennett et al
[16]. After that, many researchers studied and proposed
different theoretical types of RSP [17-24] . On the other
hand, Peng et al [19] have implement RSP using Nuclear
magnetic resonance and Xiang et al [21] have implemented
RSP using spontaneous parametric down-conversion, single
photon detector and linear optical elements. Additionally,
other RSP methods were proposed using different
entanglement [25].
In this paper, we will use the properties of quantum
systems to provide a secure method to create and share secret
keys between Alice and Bob. We will take the advantage of
entanglement swapping to remotely build an EPR pairs
between the two nodes who do not share a prior entangled
states by the help of the EPR generator. After that, Alice and
Bob will have an entangled EPR pair. Then, using remote
state preparation of quantum state, Alice can prepare a secret
key and send it to Bob using the classical channel by only one
classical bit for each qubit she prepared.
The organization of this paper will be as follows; Quantum
computing preliminaries will be covered in section II, then the
related work will be in section III. After that the proposal
algorithm in section IV. Finally the conclusion and the final
remarks will be covered in section V.
II. QUANTUM COMPUTING PRELIMINARIES
A. Quantum bits
Quantum computing takes the advantages of the laws of
quantum mechanics to efficiently solve the difficult problems
in classical computing. Having the bit as the fundamental
unit in classical computers to represent and store data.
Where, the name of the same unit in quantum computing is
called qubit. The difference between a bit and qubit is that a
bit represents one of two different disjointed states such as a
signal to be high or low, a switch to be on or off or logical
value true or false. However, a qubit can represent one state
or two states simultaneously such as a switch to be on and off
or logical value to be true and false at the same time. The
notation of one qubit is  for zero and  for one. When a
qubit is in both states  and  it state is called a
superposition and it can be represented as a linear combination
of both stats as:  (1)
The coefficients and the coefficient are complex
numbers in Cn and the states  and  are an orthonormal
basis in the two-dimensional vector space. The value
determination in classical and quantum computers are
different. For instance, we can easily examine a classical bit
and determine if it in state 0 or 1. However, in qubits we
examine the coefficients and instead. After measuring a
qubit the result become either 0 with probability or 1 with
probability resulting in:
(2)
Having both probabilities sums to one geometrically
indicates that the qubit state must be normalized to length one
in the two-dimensional vector space.
Two qubits in quantum systems can be represented by four
states using classical bit for instance, 00, 01, 10, 11. At the
other hand, two qubits can be represented by four basis states
denoted by ,,,. Moreover, the two qubits
can also be in a superposition by forming a linear combination
of states with their complex coefficient which often called an
amplitude.
 (3)
After the measurement of this multi qubit state, the result
will be similar to a system with only one qubit, as the
probability of having one of the four states is can be donated
by
B. Quantum gates
Classical systems depends on the wires and the logic gates
in the digital circuits to carry and manipulate the information.
For instance, the NOT gate in classical system perform a
specific operation which is manipulating the stats 0 and 1 by
interchanging their values in which state 0 to be 1 and state 1
to be 0. Similarly, the NOT gate in quantum systems
interchange state  to state  and state  to stae .
 (4)
Moreover, another convenient way to represent quantum
gates is in matrix form. For instance, quantum gates I, X, and
H which represent the Identity, NOT and Hadamard gates
respectively can be represented in term of matrices as:
 
  
 
 
  (5)
C. Quantum Teleportation
Quantum teleportation [7] is a technique of transferring a
quantum state from one location to another with the absence of
physical quantum channel between the sender and the
receiver[26]. However, this process of transferring the state
from one location to another doesn’t conflict with the no-
cloning which states that it is impossible to clone an exact
state without destroying the original state. That means it is
possible to move a state from one location to another but not
copying. Providing that, the teleported state will necessarily
be destroyed
Teleportation uses the EPR pairs which is also called Bell
states and Bell basis to archive its goal. Bell Basis consist of
two entangled qubits in a noncanonical basis:


(6)
The Bell basis or the noncanonical basis consists of four
entangled vectors as follow:

(7)

(8)
By using Bell basis, if Alice would like to teleport a qubit
to Bab and the qubit is in an arbitrary state.
To accomplish the teleportation process Alice perform some
operations denoted in the quantum circuit in Fig 1.
Figure 1. Quantum Teleportation Circuit
After applying the required operations Alice qubits will be
result to one of the four states  which
will indicate the state of Bob’s qubit as follows:
 (9)
 (10)
 (11)
 (12)
Alice will sends to Bob her measurement and depending
on Alice’s qubits Bob will have to fix the state in his
possession by applying one of the quantum gates. Receive
state  will require Bob to apply I gate, receiving state 
will require him to apply X gate, receiving state  will
require him to apply the Z gate and receiving state  will
require Bob to apply X and Z gates which is often called Y
gate.  
  
  (13)
III. RELATED WORK
An enhancement of multiparty quantum secret sharing
(QSS) algorithm [27] was proposed in [28]. The authors
proposed two algorithms taking advantage of the entanglement
swapping operation. The first proposed algorithm requires
the sender to release the encoded classical bits to help the
receiver to deduce intended classical bits from a qubit state.
However, in the second proposed scheme the sender and the
receiver need to physically meet and exchange the classical
bits. However, the new algorithms improve the amount of
data the original QSS protocol transmit by the reducing it
twice. Further, the new algorithms are more efficient in term
of the performance compared to the original QSS. In
addition, a reused scheme was also proposed to reuse some
qubits from previous round in new round.
A protocol for quantum authentication using entanglement
swapping was proposed in [12]. The aim in this paper is to
securely exchange messages between the participating parties.
The proposed protocol provides mutual authentication for the
sender and the receiver when using unsecure routing path.
Further, the authentication protocol depends on four sequence
numbers called Si generated by a third party with the following
functions for each number: Quantum key generation by S1,
eavesdropping detection by S2, identity identification by S3 and
message transferring using S4 . In order to obtain the secret
key, the eavesdropper on the channel need to successfully
break S3. However, the eavesdropped on the routing path
cannot break the entanglement swapping technique and cannot
have access to the controlled qubits.
Network cryptographic protocol based on entanglement
swapping key management center was proposed in [29]. The
goal was to securely distribute the secret keys between parties
with prior sharing of entanglement pairs. However, this
protocol only requires channels between the users and the key
manger center and not between the users themselves. This
protocol preserve the networks resource by only allowing the
physical communication channels between the users and the
key management center and eliminating user-to-user channels.
Also, this protocol performs well even if the users are far away
from each other’s.
Quantum direct communication (QDC) for mutual
authentication based on entanglement swapping was proposed
in [13]. There are two phases in this protocol. First phase is
used to provide mutual authentication and the second phase is
used for direct communication. The identification between
Alice and Bob can be performed by testing the Einstein-
Podolsky-Rosen (EPR) pairs. Moreover, the properties of
entanglement swapping allows Bob to decode Alice’s message
by just performing exclusive-or operation on both of Alice’s
public key and Bob’s measurement. Further, the
authentication process and the direct communication process
are proved to be secure because there is no physical
transmitting of qubits in both operations. The public key for
Alice will consist of two classical bits. Alice will have to
send it to Bob using the public classical channel. However,
that will not reveal any information about the secret key Alice
holds because they are irrelative to each other.
In [30] a study of quantum cryptography was conducted
including in details description of protocol BB84. Also,
described key reconciliation, distillation, security measure and
level of security. Security measure is a probability that
indicates if the distributed key was intercepted or not by
unauthorized third party. Two security measures were
defined as in (14) and (15) where log is the natural logarithm,
k is the number of the compared bits in the public channel and
n is the length of the key. 
(14)

(15)
In J(k) the first 20% of bits have more effect on the result
compared to the last 30% of the bits in the key. And dividing
S(k) by n gives maximum value of 0.1 which is equivalent to
37% of the bits in the key.
Travis Humble discussed securing quantum
communication in the link layer [31]. Besides, describing the
basics of quantum communications and quantum optical
communication. As well as, described the quantum seal Fig.
2 to provide integrity and monitoring to quantum
communication. As illustration, an entangled pair of photons
are created by SPDC and passed through an active and
reference fiber channels. An attempt to change a photon by
an attacker will result in destroying the correlation between
these two photons and will result in losing the entanglement.
On the other hand, Cyber-Physical security is implement using
quantum seal. Detecting any violation will be by setting
threshold stating if the communication is safe or not when the
threshold value will be the result of quantum seal process.
Figure 2. Quantum Seal [31]
Quantum determined key distribution scheme was
proposed in [32] and it is based on quantum teleportation. In
this protocol the sender and the receiver will share
predetermined key by taking the advantage of quantum
teleportation instead of random string as in the other key
distribution protocols. Moreover, because of quantum
mechanics properties, the system will be unconditionally
secure. In fact, the protocol consists of two major steps.
First step, building the shared EPR pairs. Second step,
building the secret key. In the first step Alice create EPR
pairs in state  and share them with Bob.

 (16)
First qubit A will belong to Alice and the second qubit B
will belong to Bob. Then, Bob measures his qubit in one of
three basis. After that Alice and Bob declare the basis they
used in their measurements and compare their results. If both
used different basis they discard the EPR pair. However, if
they find they are many disagreement when they used the
same basis, they can conclude that there is an eavesdropper on
the channel. Building the will be based on quantum
teleportation using the EPR pairs were previously built.
IV. PROPOSED ALGORITHM
Our proposed algorithm is based on two important
algorithms in quantum computing. The first algorithm is
entanglement swapping [33] and the second algorithm is the
remote state preparation [15] In this Algorithm we establish an
EPR-pair between source Alice and destination Bob where
Alice and Bob share EPR-pairs with an intermediate node
called Charlie. Charlie will be acting as a trusted generator
for EPR pair between Alice and Bob. The shared EPR pair
between Alice and Charlie is as follows:

(17)
And the shared EPR pair between Charlie and Bob is as
follows: 
(18)


(19)

 (20)
Applying CNOT to C:

 (21)
Applying Hadamard gate to C in the first EPR-pair:

 (22)
Rearrange and group C:



 (23)
Depending on the result of Charlie’s measurement, Alice and
Bob can build their entangled qubits after applying Pauli-X,
Pauli-Z, both or no gate. For the particles in Alice’s and
Bob’s possessions, the result of the process will be one of the
following EPR pairs:

 (24)

 (25)

 (26)

 (27)
After creating the EPR pair between the Alice and Bob, Alice
can remotely prepare a known quantum state and share it with
the Bob. For example, if Alice wants to transmit a qubit in
pure state:  (28)
And since Alice and Bob share an EPR pair, let’s consider it in
state  from the previous step. The EPR will as follows:

 (29)
As the particle A is related to Alice and particle B is related to
Bob. Now Alice wants to transmit a known state  to Bob.
So Alice can chose to measure the state in any qubit basis such
as which is related to basis  as:
 (30)
Or state  which is related to basis as:
 (31)
Writing the state  with these basis will result in:

 (32)
After Alice applies Von Neumann measurement on single
particle, let’s consider Alice’s particle result to be in
state. Then the total state will be as follows:

 (33)
When Alice sends the measurement result to Bob by sending
only one classical bit, Bob will find the particle in state
. However, when the measurement of Alice’s
particle is  then Bob will find it in state:
 (34)
Which is the complement to the original state.
This method works on any EPR pair result from the
entanglement swapping from the basis .
However, applying Pauli matrices (  will be
required to form the correct state based on the EPR pair used
between Alice and Bob.
I. CONCLUSION
In this paper we presented a secure algorithm based on
entanglement swapping and remote state preparation of
quantum state. Initially, Alice and Bob do not share an
entanglement EPR pairs and ask for Charlie’s help to create
one. After forming the EPR pairs Between Alice and Bob by
Charlie’s help, Alice can prepare a quantum state and then
help Bob to create it. However, before Alice will be able to
help Bob to create the intended state, Alice will need to fully
know the state by measuring it first using one of the bases as
aforementioned. Once Alice becomes fully aware of her state,
she can just send her one classical bit measurement result to
Bob and Bob will have to be able to construct Alice’s state
because it will be the complement of the original state. We
assume Charlie’s system is secure and therefore, it will be
impossible for any third party to manipulate the entanglement
between Alice and Bob because Charlie will process the
entanglement swapping there will not be transmission of any
physical quantum state. Moreover, the one classical bit that
Alice will send to Bob will not reveal any information about
the target state Alice prepared to Bob and also, Alice did not
send any physical quantum to Bob.
REFERENCES
[1] L. K. Grover, "A fast quantum mechanical algorithm
for database search," in Proceedings of the twenty-
eighth annual ACM symposium on Theory of
computing, 1996, pp. 212-219.
[2] M. A. Nielsen and I. L. Chuang, Quantum
computation and quantum information: Cambridge
university press, 2010.
[3] P. W. Shor, "Polynomial-time algorithms for prime
factorization and discrete logarithms on a quantum
computer," SIAM journal on computing, vol. 26, pp.
1484-1509, 1997.
[4] R. Ratan and A. Y. Oruc, "Self-Routing Quantum
Sparse Crossbar Packet Concentrators," Computers,
IEEE Transactions on, vol. 60, pp. 1390-1405, 2011.
[5] L. Yi-MIn, W. Zhang-Yin, L. Jun, and Z. Zhan-Jun,
"Remote Preparation of Three-Particle GHZ Class
States," Communications in Theoretical Physics, vol.
49, p. 359, 2008.
[6] Z.-J. Zhang, "Multiparty quantum secret sharing of
secure direct communication," Physics Letters A, vol.
342, pp. 60-66, 2005.
[7] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A.
Peres, and W. K. Wootters, "Teleporting an unknown
quantum state via dual classical and Einstein-
Podolsky-Rosen channels," Physical Review Letters,
vol. 70, p. 1895, 1993.
[8] D. Wang, Y.-m. Liu, and Z.-j. Zhang, "Remote
preparation of a class of three-qubit states," Optics
Communications, vol. 281, pp. 871-875, 2008.
[9] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden,
"Quantum cryptography," Reviews of modern
physics, vol. 74, pp. 145-195, 2002.
[10] Z.-j. Zhang, Y. Li, and Z.-x. Man, "Multiparty
quantum secret sharing," Physical Review A, vol. 71,
p. 044301, 2005.
[11] W. K. Wootters and W. H. Zurek, "A single quantum
cannot be cloned," Nature, vol. 299, pp. 802-803,
1982.
[12] C. Chia-Hung, L. Tien-Sheng, C. Ting-Hsu, Y. Shih-
Yi, and K. Sy-Yen, "Quantum authentication protocol
using entanglement swapping," in Nanotechnology
(IEEE-NANO), 2011 11th IEEE Conference on, 2011,
pp. 1533-1537.
[13] L. Zhihao, C. Hanwu, L. Wenjie, and X. Xiling,
"Mutually Authenticated Quantum Key Distribution
Based on Entanglement Swapping," in Circuits,
Communications and Systems, 2009. PACCS '09.
Pacific-Asia Conference on, 2009, pp. 380-383.
[14] H.-K. Lo, "Classical-communication cost in
distributed quantum-information processing: A
generalization of quantum-communication
complexity," Physical Review A, vol. 62, p. 012313,
2000.
[15] A. K. Pati, "Minimum classical bit for remote
preparation and measurement of a qubit," Physical
Review A, vol. 63, p. 014302, 2000.
[16] C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A.
Smolin, B. M. Terhal, and W. K. Wootters, "Remote
state preparation," Physical Review Letters, vol. 87,
p. 077902, 2001.
[17] M.-Y. Ye, Y.-S. Zhang, and G.-C. Guo, "Faithful
remote state preparation using finite classical bits and
a nonmaximally entangled state," Physical Review A,
vol. 69, p. 022310, 2004.
[18] I. Devetak and T. Berger, "Low-entanglement remote
state preparation," Physical review letters, vol. 87,
pp. 197901-197901, 2001.
[19] X. Peng, X. Zhu, X. Fang, M. Feng, M. Liu, and K.
Gao, "Experimental implementation of remote state
preparation by nuclear magnetic resonance," Physics
Letters A, vol. 306, pp. 271-276, 2003.
[20] S. Babichev, B. Brezger, and A. Lvovsky, "Remote
preparation of a single-mode photonic qubit by
measuring field quadrature noise," Physical review
letters, vol. 92, p. 047903, 2004.
[21] G.-Y. Xiang, J. Li, B. Yu, and G.-C. Guo, "Remote
preparation of mixed states via noisy entanglement,"
Physical Review A, vol. 72, p. 012315, 2005.
[22] A. Hayashi, T. Hashimoto, and M. Horibe, "Remote
state preparation without oblivious conditions,"
Physical Review A, vol. 67, p. 052302, 2003.
[23] Y. Xia, J. Song, and H.-S. Song, "Multiparty remote
state preparation," Journal of Physics B: Atomic,
Molecular and Optical Physics, vol. 40, p. 3719,
2007.
[24] B. A. Nguyen and J. Kim, "Joint remote state
preparation," Journal of Physics B: Atomic,
Molecular and Optical Physics, vol. 41, p. 095501,
2008.
[25] N. A. Peters, J. T. Barreiro, M. E. Goggin, T.-C. Wei,
and P. G. Kwiat, "Remote state preparation: arbitrary
remote control of photon polarization," arXiv
preprint quant-ph/0503062, 2005.
[26] N. S. Yanofsky and M. A. Mannucci, Quantum
computing for computer scientists vol. 20: Cambridge
University Press Cambridge, 2008.
[27] Z.-j. Zhang and Z.-x. Man, "Multiparty quantum
secret sharing of classical messages based on
entanglement swapping," Physical Review A, vol. 72,
p. 022303, 2005.
[28] Y. H. Chou, C. Y. Chen, R. K. Fan, H. C. Chao, and
F. J. Lin, "Enhanced multiparty quantum secret
sharing of classical messages by using entanglement
swapping," Information Security, IET, vol. 6, pp. 84-
92, 2012.
[29] Z. Dexi, Z. Qiuyu, and L. Xiaoyu, "Quantum
Cryptographic Network Using Entanglement
Swapping," in Networks Security Wireless
Communications and Trusted Computing (NSWCTC),
2010 Second International Conference on, 2010, pp.
373-376.
[30] M. Niemiec and A. R. Pach, "Management of
security in quantum cryptography," Communications
Magazine, IEEE, vol. 51, pp. 36-41, 2013.
[31] T. S. Humble, "Quantum security for the physical
layer," Communications Magazine, IEEE, vol. 51, pp.
56-62, 2013.
[32] L. Xiaoyu, W. Nianqing, and Z. Dexi, "Quantum
Determined Key Distribution Scheme Using
Quantum Teleportation," in Software Engineering,
2009. WCSE '09. WRI World Congress on, 2009, pp.
431-434.
[33] C. Sheng-Tzong, W. Chun-Yen, and T. Ming-Hon,
"Quantum communication for wireless wide-area
networks," Selected Areas in Communications, IEEE
Journal on, vol. 23, pp. 1424-1432, 2005.
... Entanglement swapping is widely used in many fields such as quantum secret sharing [10][11][12], quantum secure direct communication [13,14], and quantum signature [15]. Before introducing entanglement swapping, we agree on four Bell states as follows: ...
Article
Full-text available
In a quantum network, adjacent nodes can communicate with each other point to point by using pre-shared Einsten–Podolsky–Rosen (EPR) pairs, and furthermore remote nodes can establish entanglement channels by using quantum routing among intermediate nodes. However, with the rapid development of quantum networks, the demand of various message transmission among nodes inevitably emerges. In order to realize this goal and extend quantum networks, we propose a quantum coordinated multi-point communication scheme based on entanglement swapping. The scheme takes full advantage of EPR pairs between adjacent nodes and performs multi-party entanglement swapping to transmit messages. Considering various demands of communication, all nodes work cooperatively to realize different message transmission modes, including one to many, many to one and one to some. Scheme analysis shows that the proposed scheme can flexibly organize a coordinated group and efficiently use EPR resources, while it meets basic security requirement under the condition of coordinated communication.
Conference Paper
Full-text available
this paper aims to solve the security issues between two parties communicating through a Quantum channel. One of the most effective factors in Quantum cryptography is the trust between two or more parties. Communication parties need to verify the authenticity of each other and who they claim to be. The proposed model introduces a trusted center as a new party. This will be used for key distribution and trust establishment. Thus, the trusted center will be part of the process of identity verification and key agreement. Although, the suggested model in this paper is introduced between two parties and a trust center, it could be extended to cover more parties by repeating the same process on each party. This paper provides a new mechanism to establish trust between different parties. In the presented technique, each party can assure that they are communicating with the legitimate party.
Article
Full-text available
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections. In this tutorial, we describe how the field of quantum communication offers new techniques for securing the physical layer. We describe the use of quantum seals as a unique way to test the integrity and authenticity of a communication channel and to provide security for the physical layer. We present the theoretical and physical underpinnings of quantum seals including the quantum optical encoding used at the transmitter and the test for non-locality used at the receiver. We describe how the envisioned quantum physical sublayer senses tampering and how coordination with higher protocol layers allows quantum seals to influence secure routing or tailor data management methods. We conclude by discussing challenges in the development of quantum seals, the overlap with existing quantum key distribution cryptographic services, and the relevance of a quantum physical sublayer to the future of communication security.
Article
Full-text available
We show that a qubit chosen from equatorial or polar great circles on a Bloch sphere can be remotely prepared with one cbit from Alice to Bob if they share one ebit of entanglement. Also we show that any single-particle measurement on an arbitrary qubit can be remotely simulated with one ebit of shared entanglement and communication of one cbit.
Article
Full-text available
We present a setup for quantum secret sharing based on energy-time entanglement. In opposition to known implementations using three particle Greenberger-Horne-Zeilinger (GHZ) states, our idea takes advantage of only two entangled photons created via parametric down conversion. However, the system comprising the pump plus the two down-converted photons bare the same quantum correlation and can be used to mimic three entangled qubits. The relatively high coincidence count rates found in our setup enable for the first time an application of a quantum communication protocol based on more than two qubits.
Article
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time by at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. This paper considers factoring integers and finding discrete logarithms, two problems which are generally thought to be hard on a classical computer and which have been used as the basis of several proposed cryptosystems. Efficient randomized algorithms are given for these two problems on a hypothetical quantum computer. These algorithms take a number of steps polynomial in the input size, e.g., the number of digits of the integer to be factored.
Article
One of the most cited books in physics of all time, Quantum Computation and Quantum Information remains the best textbook in this exciting field of science. This 10th anniversary edition includes an introduction from the authors setting the work in context. This comprehensive textbook describes such remarkable effects as fast quantum algorithms, quantum teleportation, quantum cryptography and quantum error-correction. Quantum mechanics and computer science are introduced before moving on to describe what a quantum computer is, how it can be used to solve problems faster than 'classical' computers and its real-world implementation. It concludes with an in-depth treatment of quantum information. Containing a wealth of figures and exercises, this well-known textbook is ideal for courses on the subject, and will interest beginning graduate students and researchers in physics, computer science, mathematics, and electrical engineering.
Article
The interest in quantum-based security methods has been growing rapidly in recent years. New implementations of quantum key distribution and new network services supported by this solution are being introduced. The reason behind the growing popularity of quantum cryptography is its unrivaled security level: all eavesdroppers can be revealed through the application of the laws of physics. First of all, the rules of quantum mechanics ensure that any measurement modifies the state of the transmitted quantum bit. This modification can be discovered by the sender and the receiver. This makes passive eavesdropping impossible. Using protocols such as BB84, network users are able to send a string of bits coded by the polarized photons. After that, they can establish secure cryptographic keys through an unsecure channel using different key distillation methods. Major ongoing challenges include the control and management of security in systems using quantum cryptography, as well as tailoring security to specific end user's requirements and services.
Article
Quantum cryptography could well be the first application of quantum mechanics at the single-quantum level. The rapid progress in both theory and experiment in recent years is reviewed, with emphasis on open questions and technological issues.
Article
In this paper, we use the technique of entanglement swapping to exchange quantum message among sharing parties. For Bell measurements, quantum teleportation can provide long-distance quantum transmission when sharing parties are disconnected. The proposed mutual authentication protocol has the capability to securely identify each other under an unsafe routing path. Eavesdropping and malicious nodes may exist in the routing path. For quantum authentication protocol, it is called location-release problem. The proposed approach can solve this problem. Furthermore, source can transfer quantum message to destination in a secure way.
Article
We present many ensembles of states that can be remotely prepared by using minimum classical bits from Alice to Bob and their previously shared entangled state and prove that we have found all the ensembles in two-dimensional case. Furthermore we show that any pure quantum state can be remotely and faithfully prepared by using finite classical bits from Alice to Bob and their previously shared nonmaximally entangled state though no faithful quantum teleportation protocols can be achieved by using a nonmaximally entangled state.