Undergrad One Way vs. Entangled Cryptography

Click For Summary
Entangled photon cryptography is proposed as superior to traditional one-way photon transmission for creating one-time pads due to its ability to exploit quantum randomness and enhance security against interception. The discussion highlights that while single-photon sources can be approximated using attenuated laser beams, they are vulnerable to photon splitting attacks, which can be mitigated using decoy states. Critics argue that the emphasis on achieving high key rates for one-time pad applications may be misplaced, given the effectiveness of symmetric key cryptography. The conversation also touches on the practical challenges of generating reliable single-photon sources and the potential benefits of entanglement in quantum key distribution. Overall, the debate centers around the security advantages of entangled photons versus the practicality of existing methods.
Zafa Pi
Messages
631
Reaction score
132
In a recent article (I've lost the reference, but it doesn't matter) it said that employing entangled photons is superior to the usual one way transmission of photons from Alice to Bob for creating a one time pad. It gave no justification for this claim. Can anyone provide me with one?
 
Physics news on Phys.org
Hi Zafa Pi! Is it something like this you are looking for?

Jennewein et. al, Quantum Cryptography with Entangled Photons,
Phys. Rev. Lett. 84, 4729 – Published 15 May 2000
Abstract:
By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400–800 bits/s with bit error rates around 3%.

On Arxiv:
http://arxiv.org/abs/quant-ph/9912117
http://arxiv.org/pdf/quant-ph/9912117v1.pdf
Paper said:
However, in principle it is always possible to intercept classical key distribution unnoticedly. The recent development of quantum key distribution can cover this major loophole of classical cryptography. It allows Alice and Bob to establish two completely secure keys by transmitting single quanta (qubits) along a quantum channel. The underlying principle of quantum key distribution is that nature prohibits to gain information on the state of a quantum system without disturbing it. Therefore, in appropriately designed schemes, no tapping of the qubits is possible without showing up to Alice and Bob.
 
  • Like
Likes Zafa Pi
DennisN said:
Hi Zafa Pi! Is it something like this you are looking for?

Jennewein et. al, Quantum Cryptography with Entangled Photons,
Phys. Rev. Lett. 84, 4729 – Published 15 May 2000
Abstract:
By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400–800 bits/s with bit error rates around 3%.

On Arxiv:
http://arxiv.org/abs/quant-ph/9912117
http://arxiv.org/pdf/quant-ph/9912117v1.pdf
Good looking out, thanks. The only place I see where a comparison is made between the two methods is from your 2nd reference, where they say,

"A range of experiments have demonstrated the feasibility of quantum key distribution, including realizations using the polarization of photons9 or the phase of photons in long interferometers10. These experiments have a common problem: the sources of the photons are attenuated laser pulses which have a non-vanishing probability to contain two or more photons, leaving such systems prone to the so called beam splitter attack11.

Using photon pairs as produced by parametric down conversion allows us to approximate a conditional single photon source12 with a very low probability for generating two pairs simultaneously and a high bit rate13. Moreover, when utilizing entangled photon pairs one immediately profits from the inherent randomness of quantum mechanical observations leading to purely random keys."

I find the notion of profiting from the inherent randomness of quantum mechanical observations a bit of a red herring, since Alice can make random selections just fine.
I also find that the problem of Alice sending a couple of photons at a time worse than the difficulty of reliably employing down conversion surprising. But if they say so I'm in no position to quibble.
So I guess that's it.

BTW, are you the guy on the left or right in your avatar?
 
If we had a perfect single-photon source then there's no reason in principle why a QKD protocol using entangled states is superior.

From a practical perspective it's very easy to generate an approximate single-photon source by attenuating a laser beam. This is usually modeled as a coherent state. The problem is that for a given time slot there will be a probability that there will be 2 or more photons - which leads to a vulnerability. In order to limit this probability the attenuation can be increased, but this leads to a lower data rate - which is not great for one time pad applications. I'm guessing that this is the reason why the paper you read would suggest that entanglement based QKD is superior.

However, if one uses decoy states with attenuated coherent sources then the photon splitting attack (based on the possibility of there being two or more photons in a given timeslot) can be thwarted and security restored essentially without compromising key rate.

My own view is that there's far too much emphasis within the QKD community on getting key rates high enough for the one time pad to become a practical proposition. Given the effectiveness and speed of symmetric key crypto (with 256 bits to future-proof against quantum computing) I don't really see that there's much practical benefit except where ultra security is required in aiming for OTP applications.
 
  • Like
Likes Zafa Pi
Simon Phoenix said:
If we had a perfect single-photon source then there's no reason in principle why a QKD protocol using entangled states is superior.

From a practical perspective it's very easy to generate an approximate single-photon source by attenuating a laser beam. This is usually modeled as a coherent state. The problem is that for a given time slot there will be a probability that there will be 2 or more photons - which leads to a vulnerability. In order to limit this probability the attenuation can be increased, but this leads to a lower data rate - which is not great for one time pad applications. I'm guessing that this is the reason why the paper you read would suggest that entanglement based QKD is superior.

However, if one uses decoy states with attenuated coherent sources then the photon splitting attack (based on the possibility of there being two or more photons in a given timeslot) can be thwarted and security restored essentially without compromising key rate.

My own view is that there's far too much emphasis within the QKD community on getting key rates high enough for the one time pad to become a practical proposition. Given the effectiveness and speed of symmetric key crypto (with 256 bits to future-proof against quantum computing) I don't really see that there's much practical benefit except where ultra security is required in aiming for OTP applications.
Cool, thanks. Can you explain or give a reference to "the photon splitting attack" and how it's thwarted?
Also you say, "I don't really see that there's much practical benefit except where ultra security is required in aiming for OTP applications" Is that in case aliens have 1000 bit q-computers?:wink:
 
Zafa Pi said:
BTW, are you the guy on the left or right in your avatar?
I am a litte bit of both :smile:. I have some of Bender's crude humor and some of Zoidberg's ignorance of biology.
 
  • Like
Likes Zafa Pi
Time reversal invariant Hamiltonians must satisfy ##[H,\Theta]=0## where ##\Theta## is time reversal operator. However, in some texts (for example see Many-body Quantum Theory in Condensed Matter Physics an introduction, HENRIK BRUUS and KARSTEN FLENSBERG, Corrected version: 14 January 2016, section 7.1.4) the time reversal invariant condition is introduced as ##H=H^*##. How these two conditions are identical?

Similar threads

  • · Replies 58 ·
2
Replies
58
Views
5K
  • · Replies 19 ·
Replies
19
Views
3K
  • · Replies 20 ·
Replies
20
Views
3K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 33 ·
2
Replies
33
Views
3K
  • · Replies 24 ·
Replies
24
Views
4K
Replies
18
Views
3K
  • · Replies 21 ·
Replies
21
Views
4K
Replies
3
Views
1K
  • · Replies 35 ·
2
Replies
35
Views
5K