Device Independent

Secret keys and random numbers
from quantum non locality
Serge Massar
Message of this talk:
Quantum Information uses the weirdness of
quantum mechanics to realise tasks impossible
classicaly
Message of this talk:
Quantum Information uses the weirdness of
quantum mechanics to realise tasks impossible
classicaly
Device Independent approach uses the weirdness of
quantum non locality to realise tasks impossible
within the usual paradigm of quantum information.
Device Independent:
•QKD
•Certified Random Number Generation
•Device Independent quantum state estimation
•Self Testing of Quantum Computers
Summary of Talk
• Entanglement & Non Locality
• Device Independent:
–
–
–
–
Quantum Key Distribution
Random Number Generator
State Estimation
Self Testing of Quantum Computers
• Conclusion
Entanglement and Aspect’s Experiment
« Quantum Non Locality »
Alice
Bob
A
B
D
D
D
D
Entanglement and Aspect’s Experiment
« Quantum Non Locality »
X Input =Measurement Settings Y
Alice
Bob
A
B
D
D
D
D
a Output=Measurement Outcomes b
X Input =Measurement Settings Y
Alice
Bob
A
B
D
D
D
D
a Output=Measurement Outcomes b
P(a b | X Y)=
P(A’s outcome & B’s outcome | A’s measurement setting & B’s measurement setting)
P(a b | X Y)
Properties of Probabilities:
X=Alice’s setting
a=Alice’s outcome
Y=Bob’s setting
b=Bob’s outcome
P ( a, b | X , Y )  0
 P ( a, b | X , Y )  1
a ,b
No Signalling Conditions
 P(ab | XY )  P(a | X ) independent of Y
b
 P(ab | XY )  P(b | Y ) independent of X
a
Illustration: CHSH inequality
Alice
Bob
A
B
D
D
D
D
<CHSH> =

P(a  b  XY )  P(a  b  XY )
X,Y=0,1
 AB  AB   AB  AB 
No Signaling Quantum
-4
-2√2 -2
LHV
Quantum No Signaling
2
2√2
4
Geometric Picture
No Signaling Quantum
-4
LHV
-2√2 -2
Quantum No Signaling
2
2√2
4
P (ab | XY )  0
 P(ab | XY )  1
a ,b
 P(ab | XY )  P(a | X ) independent of Y
b
 P(ab | XY )  P(b | Y ) independent of X
a
P (ab | XY ) form a CONVEX SET, a POLYTOPE
quantum
LHV
Quantum
No Signaling
4 Interpretations-4Models
Local Hidden
Variables
•
•
•
Compatible with
Determinism
Hidden variables
determine in
advance the results
of measurements
No Signaling
Information cannot
travel faster than
the speed of light
Contradicts
Experiments
(Except for
detection loophole)
4 Interpretations-4Models
Quantum
Mechanics
• Non
Deterministic
Outcomes of
measurements
not defined in
advance
• No Signaling
Information
cannot travel
faster than the
speed of light
• Agrees with
Observations
«Quantum Non
Locality»
4 Interpretations-4Models
Non Local Hidden
Variables
•
Compatible with
Determinism
Hidden
variables
determine in
advance the
results of
measurements
•
Non Local
The hidden
variables are
global.
Information
travels faster
than c
Contradicts
Relativity
Exponentially
Inefficient
•
•
4 Interpretations-4Models
Conspiracy
Theories
•
•
Everything is
Predetermined
No Freedom to
Choose
Measurement
Settings
No Free Will
Contradicts the
Locality of
Physical
Interactions
• Exponentially
Inefficient ?
Implications for Crypto
Local Hidden
Variables
•
•
•
Compatible with
Determinism
Hidden variables
determine in
advance the results
of measurements
No Signaling
Information cannot
travel faster than
the speed of light
Contradicts
Experiments
(Except for
detection loophole)
Quantum
Mechanics
• Non
Deterministic
Outcomes of
measurements
not defined in
advance
• No Signaling
Information
cannot travel
faster than the
speed of light
• Agrees with
Observations
«Quantum Non
Locality»
Non Local Hidden
Variables
Conspiracy
Theories
•
Compatible with
Determinism
Hidden
variables
determine in
advance the
results of
measurements
•
Non Local
The hidden
variables are
global.
Information
travels faster
than c
Contradicts
Relativity
Exponentially
Inefficient ?
Contradicts the
Locality of
Physical
Interactions
•
•
•
•
Everything is
Predetermined
No Freedom to
Choose
Measurement
Settings
No Free Will
• Exponentially
Inefficient ?
Observation of Non Locality
& assume
• Validity of Quantum Mechanics
• Secure Labs (no signalling)
• Freedom to choose measurement
settings
Can be replaced by weaker
assumption: all correlations are
no signalling.
Locality Loophole does not
need to be closed:
Only require no signalling
between Alice and Bob
Some initial randomness
is necessary.
Implies:
→Measurement outcomes
are random
→Monogamy of correlations
Application:
Random Number
Generator
Application:
Key Distribution
Security depends
only on correlations
between inputs and
outputs P(ab|XY)
Device Independent
And the Experimental Situation ?
!!!!!!!!!!!!!!
Rate = mHz
!!!!!!!!!!!!!!!
Quantum Key Distribution
What about Security?
Quantum Key Distribution
What about Security?
Quantum Key Distribution
What about Security?
Quantum Key Distribution
What about Security?
Practical QKD
Beware of the hidden side channel
Beware of inefficient detectors
Solution: Device Independent Approach
Device Independent QKD
•
•
•
•
•
Ekert 1991
Mayers and Yao 2004
Barrett Hardy and Kent 2005
Acín Brunner Gisin Massar Pironio and Scarani 2007
M. McKague, arXiv:0908.0503
• Key Idea: Monogamy of Non Local Correlations
Alice Bob Eve share non local correlations P(abe | XYE ).
Alice and Bob's correlations P(ab | XY )   P(abe | XYE ) violate CHSH.
e
Then Eve factors out: P(abe | XYE )  P(ab | XY ) P(e | E )
Device Independent QKD
• Key Idea: Monogamy of Non Local Correlations
Alice Bob Eve share non local correlations P(abe | XYE ).
Alice and Bob's correlations P(ab | XY )   P(abe | XYE ) violate CHSH.
e
Then Eve factors out: P(abe | XYE )  P(ab | XY ) P(e | E )
• Security depends only on the correlations between inputs and
outputs
• No hypothesis needed
– on Hilbert space dimension
– on workings of devices
• they could even be provided by an adversary
Device Independent QKD
To make the concept practical:
• Theory needed: security proof when the same devices are used
in succession
• Experiment needed: Non Locality Experiments with:
– detection loophole closed
– High data rate
– Long Distance Communication
• Not necessary to close locality loophole !!
– Security of Laboratories is Necessary for crypto
– Security of Laboratories Sufficient to enforce No Signalling
• Could even be secure against Post-Quantum Adversary
– Only require that No Signalling Conditions be Enforced.
Random Number Generators
Random Number Generators
Are RNG’s secure?
-Are the bits random?
(statistical tests only say that they look random)
-Are they secret?
(maybe the device has failed, is preprogramed)
Device Independent Random
Number Generator
Kollbeck, PhD thesis
Pironio Acin Massar Boyer de la Giroday Matsukevich Maunz Olmschenk Hayes Luo Manning Monroe, submitted
• Key Ideas:
– Monogamy of Non Local Correlations
P(abe|XYE)≈P(ab|XY)P(e|E)
→ adversary has no knowledge of a,b
– Violation of a Bell inequality implies that
outcomes a,b are random
→ new random numbers are generated
Device Independent Random
Number Generator
• Key Idea:
– Monogamy of Non Local Correlations
P(abe|XYE)≈P(ab|XY)P(e|E)
→ adversary has no knowledge of a,b
– Violation of a Bell inequality implies that
outcomes a,b are random
→ new random numbers are generated
H ( AB | XY )  f ( CHSH )
 3 CHSH 
H ( A | XY )   Log  

2
4


Even Secure Against Post Quantum
adversary limited only by No-Signalling
Device Independent Random
Number Generator
• Key Idea:
– Monogamy of Non Local Correlations
P(abe|XYE)≈P(ab|XY)P(e|E)
→ adversary has no knowledge of a,b
– Violation of a Bell inequality implies that
outcomes a,b are random
→ new random numbers are generated
• Randomness Expansion:
– Most of the time choose X=Y=0
– From time to time test other settings
→ Use O(n Log n) random bits to produce O(n2) new random bits
Experimental Demonstration
Theory: takes into account possible
memory of devices
Use two ions in two traps separated by
about 1m
!!Not Necessary to close Locality
Loophole!!
Detection loophole closed
Experimental Demonstration
Theory: takes into account possible
memory of devices
Use two ions in two traps separated by
about 1m
!!Not Necessary to close Locality
Loophole!!
Detection loophole closed
•Number of events n=3016
•Data acquisition time: 1 month
•<CHSH>=2.414
•42 new private random bits produced at 99% confidence level
Experimental Demonstration
Theory: takes into account possible
memory of devices
Use two ions in two traps separated by
about 1m
!!Not Necessary to close Locality
Loophole!!
Detection loophole closed
•Number of events n=3016
•Data acquisition time: 1 month
•<CHSH>=2.414
•42 new private random bits produced at 99% confidence level
For the first time, the randomness of a source can be certified by
something more fundamental than statistical tests.
Device Independent State Estimation
Bardyn Liew Massar McKague Scarani arXive:0907.3584
X
Y
?
?
a
b
Observe: <CHSH>
Task:
• Find Fidelity to Φ+ state
• Find Entanglement of Formation of source
as function of <CHSH> only
Device Independent State Estimation
X
Y
?
?
a
b
Observe: <CHSH>
Task:
• Find Fidelity to Φ+ state
• Find Entanglement of Formation of source
as function of <CHSH> only
Dimension Witnesses
Brunner Pironio Acin Gisin Méthot Scarani 2008
Vertesi Pal arXiv:0812.1572
Briet Buhrman Toner arXiv:0901.2009
X
Y
?
?
a
b
Observe: Violation of Bell inequality
Task:
• Find Lower Bound on Dimension of Entangled State
as function of violation of Bell inequality only
Self Testing of Quantum Computers
Mayers Yao 2004
Magniez Mayers Mosca Ollivier 2006
First
Quantum
Computer
?
output
Repeatedly measure
Second
Quantum
Computer
?
Results of measurements
Certify that computer output is correct
Repeated Use of Unknown Quantum Computer, using Unknown Entanglement,
with intermediate measurements can Certify that output of computation is correct.
Message of this talk:
Use the weirdness of quantum non locality to realise
tasks impossible within the usual paradigm of quantum
information:
Device Independent
•Quantum Key Distribution
•Certified Random Number Generation
•Quantum State Estimation
•Self Testing of Quantum Computers
Overview:
A. Ekert, Less Reality, More Security, Physics World, Sept 2009, pp. 28-32