22
Demonstration of an efficient quantum Demonstration of an efficient quantum phase phase - - covariant cloning and it covariant cloning and it s possible s possible application to simulate an eavesdropping application to simulate an eavesdropping attack in quantum cryptography attack in quantum cryptography Du Du Jiangfeng Jiangfeng Nov. 22, 2003 Nov. 22, 2003 Cooperators : Cooperators : Zou Zou Ping (Univ. of Ping (Univ. of Sci Sci . & Tech. of China) . & Tech. of China) T. T. Durt Durt (TONA Free University of Brussels) (TONA Free University of Brussels) L. C. L. C. Kwek Kwek ,C. H. Oh, ,C. H. Oh, C.H.Lai C.H.Lai (National Univ. of Singapore) (National Univ. of Singapore) Artur Artur Ekert Ekert (DAMTP, Univ. of Cambridge) (DAMTP, Univ. of Cambridge)

An Experimental Demonstration of Quantum Phase-Convariant Cloner

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Demonstration of an efficient quantum Demonstration of an efficient quantum phasephase--covariant cloning and itcovariant cloning and it’’s possible s possible application to simulate an eavesdropping application to simulate an eavesdropping attack in quantum cryptographyattack in quantum cryptography

DuDu JiangfengJiangfengNov. 22, 2003Nov. 22, 2003

Cooperators :Cooperators :ZouZou Ping (Univ. of Ping (Univ. of SciSci. & Tech. of China). & Tech. of China)T. T. DurtDurt (TONA Free University of Brussels)(TONA Free University of Brussels)L. C. L. C. KwekKwek ,C. H. Oh, ,C. H. Oh, C.H.LaiC.H.Lai (National Univ. of Singapore)(National Univ. of Singapore)ArturArtur EkertEkert (DAMTP, Univ. of Cambridge)(DAMTP, Univ. of Cambridge)

OutlineOutline

IntroductionIntroductionPhasePhase--convariantconvariant cloningcloningExperimentExperimentDiscussion and conclusionDiscussion and conclusion

BackgroundBackground

Quantum Information

Computation Communication

Implement: Trapped ion, Cavity QED, NMR, JJ, Quantum dot….

Recent theoretical results (2003)Recent theoretical results (2003)

1.1. JiangfengJiangfeng DuDu and and HuiHui Li, Quantum Games of Li, Quantum Games of Asymmetric Information,Asymmetric Information, Physics Review E 68Physics Review E 68,,016124 (2003).016124 (2003).

2.2. HuiHui Li and Li and JiangfengJiangfeng DuDu, Relativistic, Relativistic--invariant invariant quantum entanglement between the spins of moving quantum entanglement between the spins of moving bodies, Physics Review A 68, 022108 (2003).bodies, Physics Review A 68, 022108 (2003).

3.3. K. Singh, D. M. Tong, K. K. Singh, D. M. Tong, K. BasuBasu, J. L. Chen, and J. F. , J. L. Chen, and J. F. DuDu,,Geometric phases for Geometric phases for nondegeneratenondegenerate and and degenerate mixed statesdegenerate mixed states,,Physics Review A 67, Physics Review A 67, (2003) 032106.(2003) 032106.

4.4. JiangfengJiangfeng DuDu, , HuiHui Li, Li, XiaodongXiaodong XuXu, , XianyiXianyi Zhou and Zhou and RongdianRongdian Han, PhaseHan, Phase--TransitionTransition--like behavior of like behavior of Quantum Games, Journal ofQuantum Games, Journal of Physics A: Physics A: Mathematical and General 36 (2003) 6551Mathematical and General 36 (2003) 6551--6562. 6562.

NMRNMR--QIP ExperimentsQIP Experiments

Quantum Logic Gates and AlgorithmQuantum Logic Gates and Algorithm–– JiangfengJiangfeng DuDu et al., et al., Physical Review APhysical Review A 63, 042302 (2001).63, 042302 (2001).–– JiangfengJiangfeng DuDu et al., et al., Physical Review APhysical Review A 64, 042306 (2001).64, 042306 (2001).–– JiangfengJiangfeng DuDu et al., et al., Physical Review A 67, 042316Physical Review A 67, 042316 (2003).(2003).

Quantum GamesQuantum Games–– JiangfengJiangfeng DuDu et al., et al., Physical Review Letters 88, 137902Physical Review Letters 88, 137902

(2002).(2002).

Geometric Phase of Mixed StatesGeometric Phase of Mixed States–– JiangfengJiangfeng DuDu et al., et al., Physical Review Letters 91, 100403Physical Review Letters 91, 100403

(2003).(2003).

StateState--dependent cloning, (submitted, 2003) dependent cloning, (submitted, 2003)

NoNo--cloning theoremcloning theorem

For unknown quantum stateFor unknown quantum stateW.K. W.K. WootersWooters and W.H. and W.H. ZurekZurek, Nature 299, 802(1982), Nature 299, 802(1982)–– An An arbitrary quantum statearbitrary quantum state can not be cloned can not be cloned

exactly.exactly.–– Security of quantum cryptographySecurity of quantum cryptography

V. V. BuzekBuzek and M. and M. HilleryHillery, , Phys.Rev.APhys.Rev.A 54, 1844 (1996)54, 1844 (1996)L.M.DuanL.M.Duan and and G.C.GuoG.C.Guo, Phys.Rev.Lett.80, 4999(1997), Phys.Rev.Lett.80, 4999(1997)

–– However, it can be cloned approximately or However, it can be cloned approximately or probabilisticallyprobabilistically

StateState--independent & Stateindependent & State--dependent clonedependent clone

Universal Quantum Cloning Universal Quantum Cloning Machine (UQCM)Machine (UQCM)

StateState--independent cloningindependent cloningV. V. BuzekBuzek and M. and M. HilleryHillery, , Phys.Rev.APhys.Rev.A 54, 1844 (1996)54, 1844 (1996)

–– StateState--independentindependent–– 33--qubit for cloning 1 to 2 qubit for cloning 1 to 2 –– Optimal Fidelity: 83.33%Optimal Fidelity: 83.33%

–– Application: the optimal device for an Application: the optimal device for an eavesdropper to attack the 6eavesdropper to attack the 6--state protocol of state protocol of quantum cryptography. QBER=1quantum cryptography. QBER=1--F=16.67%F=16.67%

UQCM ExperimentsUQCM ExperimentsExperimental Fidelities: (Experimental Fidelities: (theory: 83.33%)theory: 83.33%)–– Single photon: 81%Single photon: 81%–– Optical Fiber Amplifier: 82%Optical Fiber Amplifier: 82%–– NMR: 58%NMR: 58%

Y.F. Huang et al., Y.F. Huang et al., Phys.RevPhys.Rev. A 64, 012315 (2001). A 64, 012315 (2001)A. LamasA. Lamas--LinaresLinares et al., Science 296, 712 (2002)et al., Science 296, 712 (2002)S.FaselS.Fasel et al., et al., Phys.Rev.LettPhys.Rev.Lett. 89, 107901 (2002) . 89, 107901 (2002) H.K. Cummins et al., H.K. Cummins et al., Phys.Rev.LettPhys.Rev.Lett. 80, 4999(2002) . 80, 4999(2002)

QuntumQuntum PhasePhase--ConvariantConvariantCloning Machine (QPCCM)Cloning Machine (QPCCM)

StateState--dependent clonedependent cloneUsed to copy the states which has in priori information, it is Used to copy the states which has in priori information, it is the optimal device for an eavesdropper to attack the 4the optimal device for an eavesdropper to attack the 4--state state protocol of quantum cryptography, While UQCM can be protocol of quantum cryptography, While UQCM can be chosen to attack the 6chosen to attack the 6--state protocol. QBER=1state protocol. QBER=1--F=14.6%F=14.6%

TheoryTheoryD.BrubD.Brub et al., Phys. Rev. A 56, 3446 (1997)et al., Phys. Rev. A 56, 3446 (1997)–– 33--qubitqubit–– StateState--dependentdependent–– Slightly high fidelity: 85.4%Slightly high fidelity: 85.4%

There is no experiment existedThere is no experiment existed

In this talkIn this talk

–– Design a costDesign a cost--efficient 2efficient 2--qubit phasequbit phase--invariant cloning machineinvariant cloning machineC.NiuC.Niu and and R.B.GriffithsR.B.Griffiths, Phys. Rev. A 62, 012302 (2000), Phys. Rev. A 62, 012302 (2000)

D. Thomas and D. Thomas and J.F.DuJ.F.Du, quant, quant--ph/030972ph/030972

–– NMR realizationNMR realizationExperimental Fidelity: 84.8% and 84.8% Experimental Fidelity: 84.8% and 84.8%

(85.4%),(85.4%), it is higher than 83.33% of UQCMit is higher than 83.33% of UQCM..

–– It should be an optimal eavesdropping It should be an optimal eavesdropping attacker of BB84 QKD. attacker of BB84 QKD.

PhasePhase--covariant cloning Networkcovariant cloning Network

( )

%4.85

,4

sinsinsincos1

21

coscoscossin1

21

10cos01sin10

0000

102

1:

10000cossin00sincos00001

2

2

2

2

==

==

⎟⎟⎠

⎞⎜⎜⎝

⎛ +=

⎟⎟⎠

⎞⎜⎜⎝

⎛ +=

=

+⎯ →⎯

⎯ →⎯

+=

⎟⎟⎟⎟⎟

⎜⎜⎜⎜⎜

−=

+

ϕρϕ

ρρπφ

φφφφ

ρ

φφφφ

ρ

ϕϕρ

φφ

ϕ

φφφφ

α

α

α

α

α

e

eb

i

i

e

i

i

b

bein

beout

Ube

Ube

i

be

Foptimal

if

ee

ee

UU

estateinput

U

be

be

⎟⎟⎠

⎞⎜⎜⎝

⎛−

=

⎟⎟⎟⎟⎟

⎜⎜⎜⎜⎜

=

φφφφ

cossinsincos

0100100000100001

R

U be

Fidelity is independend of phase.

NMR quantum computingNMR quantum computing

QubitsQubitsPartially Partially deuterateddeuterated cytosine cytosine

molecule contains two protons, in a molecule contains two protons, in a magnetic field, each spin state of magnetic field, each spin state of proton could be used as a proton could be used as a qubitqubit. . Distinguish each Distinguish each qubitqubitDifferent Different LarmorLarmor frequencies (the frequencies (the

chemical shift) enable us to address chemical shift) enable us to address each each qubitqubit individually.individually.Quantum logic gates Quantum logic gates Radio Frequency (RF) fields and Radio Frequency (RF) fields and

spinspin----spin couplings between the spin couplings between the nuclei are used to implement nuclei are used to implement quantum logic gates. quantum logic gates.

ExperimentExperiment

22--QubitQubitInitial state:Initial state:

Unitary evolutionUnitary evolutionReadoutReadout

( )}135,90,45,0{

0,102

1

=

=+=

α

ϕϕ αee

ib

e

beU

yx orqubiteachFor σσ:

RF Pulse sequenceRF Pulse sequence

ExperimentExperiment

We have prepared a total of 24 input equator We have prepared a total of 24 input equator states; states;

For each input state, the cloning For each input state, the cloning transformation was performed;transformation was performed;finally we measure each copy and calculate finally we measure each copy and calculate the fidelity, which is phasethe fidelity, which is phase--covariant. covariant. Experimentally, we get the mean fidelity of Experimentally, we get the mean fidelity of this phasethis phase--covariant cloning iscovariant cloning isF1=0.844 and F2=0.848, which is close F1=0.844 and F2=0.848, which is close to the optimal theoretical value 0.854.to the optimal theoretical value 0.854.

( )102

1 αϕ ib

e+=

Discussion and conclusionDiscussion and conclusion

Compared to NMR experiment for QUCMCompared to NMR experiment for QUCMH.K. Cummins et al., H.K. Cummins et al., Phys.Rev.LettPhys.Rev.Lett. 80, 4999(2002). 80, 4999(2002)

–– 33--qubit circuit is much more complicated than 2qubit circuit is much more complicated than 2--qubit circuit in a real experimentqubit circuit in a real experiment..

–– their lower fidelity 58% (not the expected 83%) their lower fidelity 58% (not the expected 83%) is is arisedarised from from decoherencedecoherence and B1 and B1 inhomogeneityinhomogeneity effects. The time to perform their effects. The time to perform their pulse sequences is at least 0.4s, close to pulse sequences is at least 0.4s, close to T2=0.72s; In our experiment, T2 is near 0.4s. T2=0.72s; In our experiment, T2 is near 0.4s. The total time to perform the The total time to perform the exprimentexpriment is about is about 5.7ms.5.7ms.

Simulate an eavesdropping Simulate an eavesdropping attackerattacker

(1)Prepare one of four BB84 states (1)Prepare one of four BB84 states (2) Then perform the phase(2) Then perform the phase--covariant cloningcovariant cloning

(3) we perform 288 experiments distinguished by 4 (3) we perform 288 experiments distinguished by 4 BB84 states and 24 rotation angles BB84 states and 24 rotation angles θθ and 3 and 3 measurement. measurement.

Symmetry of QPCCMSymmetry of QPCCM

X base y base

Mutual information (X & Y bases)Mutual information (X & Y bases)

Mutual information & QBERMutual information & QBER

x -y

-y

y

y y

y

-y

y

-x

y -y

-y

-x

ô1 ô2ô1 ô2 ô1 ô1y

(b)

(a)ô1

60 45 135

y -y-yx

z z

ô1

y -y

Discussion and conclusionDiscussion and conclusion

Compared to optical experiment,Compared to optical experiment,–– our result is more easier for Eve to store the our result is more easier for Eve to store the

photons and wait Alice and Bob to reveal the photons and wait Alice and Bob to reveal the bases.bases.

–– Our work clone the effectiveOur work clone the effective--pure states rather pure states rather than pure state. However, the basic idea is than pure state. However, the basic idea is general, it can be extended to other physical general, it can be extended to other physical system such as trapped ionssystem such as trapped ions……

it is the optimal device for an eavesdropper it is the optimal device for an eavesdropper to attack BB84 protocol of quantum to attack BB84 protocol of quantum cryptography.cryptography.

acknowledgmentacknowledgment

I acknowledge the support for my visiting here.I acknowledge the support for my visiting here.

The project was supported by the National The project was supported by the National Nature Science Foundation of China (Grants. Nature Science Foundation of China (Grants. No. 10075041) and funded by the National No. 10075041) and funded by the National Fundamental Research Program Fundamental Research Program (2001CB309300).(2001CB309300).