Undergrad QKD Question: Alice & Bob Detector Cross-Checking

  • Thread starter Thread starter Madi Araly
  • Start date Start date
  • Tags Tags
    Detector
Click For Summary
SUMMARY

This discussion centers on the mechanics of Quantum Key Distribution (QKD) between Alice and Bob, specifically addressing the communication of measurement bases and the implications for security against an eavesdropper, Eve. Alice sends entangled photons to Bob, who measures them and communicates the basis used for each measurement. This communication does not occur through the same channel as the photons to prevent Eve from intercepting the key. The process includes public comparison of a random subset of measurements to test the security of the quantum channel, ensuring that if Eve intercepts the photons, the correlation between Alice and Bob's measurements will be significantly lower.

PREREQUISITES
  • Understanding of Quantum Key Distribution (QKD)
  • Knowledge of entangled photons and their properties
  • Familiarity with quantum measurement bases
  • Concepts of information reconciliation and privacy amplification
NEXT STEPS
  • Research the principles of Quantum Key Distribution (QKD) and its security mechanisms
  • Study the role of entangled photons in quantum communication
  • Learn about information reconciliation techniques in QKD
  • Explore privacy amplification methods to enhance key security
USEFUL FOR

This discussion is beneficial for quantum physicists, cryptographers, and anyone involved in the development or implementation of secure quantum communication systems.

Madi Araly
Messages
19
Reaction score
1
Hello,

I've been learning about Quantum Key Distribution recently, but I can't seem to find the logic in one of the steps... maybe I'm just having a brain block. o_O

So let's say Alice has sent a stream of entangled photons to Bob, and he finishes measuring them and is left with a binary code. All of the lessons I've watched tell me that Alice will tell him "right" or "wrong" once he states which detector he used for each one, but where is this communication supposed to take place?

It doesn't occur in the same system through which the photons were sent, but I don't see how they could do this over any system that Eve could not access. They could meet in person, but arrangements like this would be too impractical in almost all cases. Any insight?
 
Physics news on Phys.org
That's the thing. Eve does have access to Bob's message to Alice about what basis he measured in for each pair of photons, but that info doesn't help her learn about Alice and Bob's secret key.

The way I understand it is that Bob tells Alice what basis he measured in after he measures his photon. If Eve intercepted the photon en route to Bob, she has a 50/50 chance of measuring in the same basis that Bob chooses.

When Bob and Alice have finished their measurements, they can take a random subset of them, and actually compare outcomes publically. These bits won't be used for the secret key, but can be used to test the security of the quantum channel. If Eve were intercepting photons, measuring them, and sending them on their way, then instead of having nearly 100 percent correlation when Alice and Bob measure in the same basis, the correlation will be much lower. If their measured correlation is high enough, they know with high probability that Eve couldn't be listening in, and they key they share is secure.

After that, Alice and Bob's keys are not necessarily identical, due to experimental noise and such, but they can perform information reconciliation to get a smaller identical key, and privacy amplification to get an even smaller secret key about which Eve can know nothing (in the sense that Eve would be equally likely to guess all possible keys with her info).
 
Last edited:
jfizzix said:
That's the thing. Eve does have access to Bob's message to Alice about what basis he measured in for each pair of photons, but that info doesn't help her learn about Alice and Bob's secret key.

The way I understand it is that Bob tells Alice what basis he measured in after he measures his photon. If Eve intercepted the photon en route to Bob, she has a 50/50 chance of measuring in the same basis that Bob chooses.

When Bob and Alice have finished their measurements, they can take a random subset of them, and actually compare outcomes publically. These bits won't be used for the secret key, but can be used to test the security of the quantum channel. If Eve were intercepting photons, measuring them, and sending them on their way, then instead of having nearly 100 percent correlation when Alice and Bob measure in the same basis, the correlation will be much lower. If their measured correlation is high enough, they know with high probability that Eve couldn't be listening in, and they key they share is secure.

After that, Alice and Bob's keys are not necessarily identical, due to experimental noise and such, but they can perform information reconciliation to get a smaller identical key, and privacy amplification to get an even smaller secret key about which Eve can know nothing (in the sense that Eve would be equally likely to guess all possible keys with her info).

Ahh, I get it now. You managed to explain it in a better way than many of the lectures, so hats off to you. Thanks for your help!
 

Similar threads

  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 24 ·
Replies
24
Views
4K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 19 ·
Replies
19
Views
4K
  • · Replies 1 ·
Replies
1
Views
1K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 11 ·
Replies
11
Views
5K
  • · Replies 5 ·
Replies
5
Views
2K
Replies
2
Views
4K
  • · Replies 8 ·
Replies
8
Views
4K