64
Sharing Quantum Secrets Term Paper - II Arunabha Saha Roll No: 91/CSE/111033 Supervisors : Dr. Guruprasad Kar Physics and Applied Mathematics Unit Indian Statistical Institute, Kolkata Dr. Pritha Banerjee Dept. of Computer Science & Engineering University of Calcutta Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 1 / 39

Introduction to Quantum Secret Sharing

Embed Size (px)

DESCRIPTION

This talk mainly focused on the protocol of quantum secret sharing(QSS). First the (k,n) threshold scheme was discussed here which was introduced by Adi Shamir and then migrated to the idea of quantum secret sharing scheme. The QSS scheme was first introduced by Hillery et al. in 1999.

Citation preview

Page 1: Introduction to Quantum Secret Sharing

Sharing Quantum SecretsTerm Paper - II

Arunabha SahaRoll No: 91/CSE/111033

Supervisors :

Dr. Guruprasad KarPhysics and Applied Mathematics Unit

Indian Statistical Institute, Kolkata

Dr. Pritha BanerjeeDept. of Computer Science & Engineering

University of Calcutta

June 13, 2014Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 1 / 39

Page 2: Introduction to Quantum Secret Sharing

Outline

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 2 / 39

Page 3: Introduction to Quantum Secret Sharing

Demystifying Secrets

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 3 / 39

Page 4: Introduction to Quantum Secret Sharing

Demystifying Secrets

Demystifying Secrets

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 4 / 39

Page 5: Introduction to Quantum Secret Sharing

Demystifying Secrets

What is a Secret??

simple..!!, which is not known publicly.

mathematically secret refers to limited access to a finite set ofmembers, say S = {s1, s2, ...., sr}.When we share completely, basically we are increasing the cardinalityof that set. Say to n members the secret is shared then thecardinality increase by n.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 5 / 39

Page 6: Introduction to Quantum Secret Sharing

Demystifying Secrets

What is a Secret??

simple..!!, which is not known publicly.

mathematically secret refers to limited access to a finite set ofmembers, say S = {s1, s2, ...., sr}.When we share completely, basically we are increasing the cardinalityof that set. Say to n members the secret is shared then thecardinality increase by n.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 5 / 39

Page 7: Introduction to Quantum Secret Sharing

Demystifying Secrets

What is a Secret??

simple..!!, which is not known publicly.

mathematically secret refers to limited access to a finite set ofmembers, say S = {s1, s2, ...., sr}.When we share completely, basically we are increasing the cardinalityof that set. Say to n members the secret is shared then thecardinality increase by n.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 5 / 39

Page 8: Introduction to Quantum Secret Sharing

Demystifying Secrets

Problem with secret sharing

The complete sharing can be possible, iff

new shareholders as well as the existing ones are entirely trusted, inshort honest.

the medium is secure, through which sharing takes place.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 6 / 39

Page 9: Introduction to Quantum Secret Sharing

Demystifying Secrets

Problem with secret sharing

The complete sharing can be possible, iff

new shareholders as well as the existing ones are entirely trusted, inshort honest.

the medium is secure, through which sharing takes place.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 6 / 39

Page 10: Introduction to Quantum Secret Sharing

Demystifying Secrets

Problem with secret sharing

The complete sharing can be possible, iff

new shareholders as well as the existing ones are entirely trusted, inshort honest.

the medium is secure, through which sharing takes place.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 6 / 39

Page 11: Introduction to Quantum Secret Sharing

Demystifying Secrets

But...Life is not so easy

Now what if the things are not in favour..!!??

shareholders are dishonest

medium is not completely secure

But we have to share, no alternative..!!

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 7 / 39

Page 12: Introduction to Quantum Secret Sharing

Demystifying Secrets

But...Life is not so easy

Now what if the things are not in favour..!!??

shareholders are dishonest

medium is not completely secure

But we have to share, no alternative..!!

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 7 / 39

Page 13: Introduction to Quantum Secret Sharing

Demystifying Secrets

But...Life is not so easy

Now what if the things are not in favour..!!??

shareholders are dishonest

medium is not completely secure

But we have to share, no alternative..!!

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 7 / 39

Page 14: Introduction to Quantum Secret Sharing

Demystifying Secrets

But...Life is not so easy

Now what if the things are not in favour..!!??

shareholders are dishonest

medium is not completely secure

But we have to share, no alternative..!!

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 7 / 39

Page 15: Introduction to Quantum Secret Sharing

Demystifying Secrets

Hope, that keep us alive

In such a hostile situation....

we still can assume (by heart or by probability) that there 1 or fewparties are honest..!!

we have to curb the complete access to everyone(we believe and don‘tbelieve!!)

we need a scheme or protocol which works fine with dishonest as wellas honest guys, and can ensure security.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 8 / 39

Page 16: Introduction to Quantum Secret Sharing

Demystifying Secrets

Hope, that keep us alive

In such a hostile situation....

we still can assume (by heart or by probability) that there 1 or fewparties are honest..!!

we have to curb the complete access to everyone(we believe and don‘tbelieve!!)

we need a scheme or protocol which works fine with dishonest as wellas honest guys, and can ensure security.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 8 / 39

Page 17: Introduction to Quantum Secret Sharing

Demystifying Secrets

Hope, that keep us alive

In such a hostile situation....

we still can assume (by heart or by probability) that there 1 or fewparties are honest..!!

we have to curb the complete access to everyone(we believe and don‘tbelieve!!)

we need a scheme or protocol which works fine with dishonest as wellas honest guys, and can ensure security.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 8 / 39

Page 18: Introduction to Quantum Secret Sharing

Demystifying Secrets

Hope, that keep us alive

In such a hostile situation....

we still can assume (by heart or by probability) that there 1 or fewparties are honest..!!

we have to curb the complete access to everyone(we believe and don‘tbelieve!!)

we need a scheme or protocol which works fine with dishonest as wellas honest guys, and can ensure security.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 8 / 39

Page 19: Introduction to Quantum Secret Sharing

Entanglement

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 9 / 39

Page 20: Introduction to Quantum Secret Sharing

Entanglement

Bipartite System

Suppose we have two parties, Alice and Bob, each having a qubit.Alice‘s qubit: |ψ1〉 = α0 |0〉+ α1 |1〉Bob‘s qubit: |ψ2〉 = β0 |0〉+ β1 |1〉What will be the state of composite system of Alice and Bob ?

given as

|ψ12〉 = (α0 |0〉+ α1 |1〉)⊗ (β0 |0〉+ β1 |1〉)= α0β0 |00〉1 +α0β1 |01〉+ α1β0 |10〉+ α1β1 |11〉

The converse is also true. If we have the bipartite system(|ψ12〉) thenwe can factorise it to get the corresponding qubits involved.

1|0〉 ⊗ |0〉 ≡ |0〉 |0〉 ≡ |00〉Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 10 / 39

Page 21: Introduction to Quantum Secret Sharing

Entanglement

Bipartite System

Suppose we have two parties, Alice and Bob, each having a qubit.Alice‘s qubit: |ψ1〉 = α0 |0〉+ α1 |1〉Bob‘s qubit: |ψ2〉 = β0 |0〉+ β1 |1〉What will be the state of composite system of Alice and Bob ?

given as

|ψ12〉 = (α0 |0〉+ α1 |1〉)⊗ (β0 |0〉+ β1 |1〉)= α0β0 |00〉1 +α0β1 |01〉+ α1β0 |10〉+ α1β1 |11〉

The converse is also true. If we have the bipartite system(|ψ12〉) thenwe can factorise it to get the corresponding qubits involved.

1|0〉 ⊗ |0〉 ≡ |0〉 |0〉 ≡ |00〉Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 10 / 39

Page 22: Introduction to Quantum Secret Sharing

Entanglement

Bipartite System

Suppose we have two parties, Alice and Bob, each having a qubit.Alice‘s qubit: |ψ1〉 = α0 |0〉+ α1 |1〉Bob‘s qubit: |ψ2〉 = β0 |0〉+ β1 |1〉What will be the state of composite system of Alice and Bob ?

given as

|ψ12〉 = (α0 |0〉+ α1 |1〉)⊗ (β0 |0〉+ β1 |1〉)= α0β0 |00〉1 +α0β1 |01〉+ α1β0 |10〉+ α1β1 |11〉

The converse is also true. If we have the bipartite system(|ψ12〉) thenwe can factorise it to get the corresponding qubits involved.

1|0〉 ⊗ |0〉 ≡ |0〉 |0〉 ≡ |00〉Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 10 / 39

Page 23: Introduction to Quantum Secret Sharing

Entanglement

Bipartite System

Suppose we have two parties, Alice and Bob, each having a qubit.Alice‘s qubit: |ψ1〉 = α0 |0〉+ α1 |1〉Bob‘s qubit: |ψ2〉 = β0 |0〉+ β1 |1〉What will be the state of composite system of Alice and Bob ?

given as

|ψ12〉 = (α0 |0〉+ α1 |1〉)⊗ (β0 |0〉+ β1 |1〉)= α0β0 |00〉1 +α0β1 |01〉+ α1β0 |10〉+ α1β1 |11〉

The converse is also true. If we have the bipartite system(|ψ12〉) thenwe can factorise it to get the corresponding qubits involved.

1|0〉 ⊗ |0〉 ≡ |0〉 |0〉 ≡ |00〉Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 10 / 39

Page 24: Introduction to Quantum Secret Sharing

Entanglement

Entangled State

A pure state of two systems is entangled if it cannot be written as aproduct of two states -

|ψAB〉 6= |ψA〉 ⊗ |ψB〉

We have four such states entangled states called Bell States[4] or EPRStates.

|φ+〉 = 1√2(|00〉+ |11〉)

|φ−〉 = 1√2(|00〉 − |11〉)

|ψ+〉 = 1√2(|01〉+ |10〉)

|ψ−〉 = 1√2(|01〉 − |10〉)

These 4 states are called Maximally Entangled States.Any state of the form a |00〉 ± b |11〉 or a a |01〉 ± b |10〉, where a 6= b, iscalled Pure Entangled State.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 11 / 39

Page 25: Introduction to Quantum Secret Sharing

No Cloning Theorem

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 12 / 39

Page 26: Introduction to Quantum Secret Sharing

No Cloning Theorem

No Cloning Theorem

No Cloning Theorem

In 1982, Wootters and Zurek showed in their paper that a single quantumcannot be cloned[2].

We want to create an copying device for states(say) in C2. Let A be thesystem which state we want to copy into some other state of system B.The unitary transformation Uc that performs this action,

Uc(|0〉A ⊗ |0〉B) = |0〉A ⊗ |0〉BUc(|1〉A ⊗ |0〉B) = |1〉A ⊗ |1〉B

But then Uc act on |ψ〉 = a |0〉+ b |1〉 as

Uc((a |0〉A + b |1〉A)⊗ |0〉B) = a |0〉A ⊗ |0〉B + b |1〉A ⊗ |1〉B 6= |ψ〉 ⊗ |ψ〉,

this implies that Uc has failed to copy |ψ〉

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 13 / 39

Page 27: Introduction to Quantum Secret Sharing

Classical Secret Sharing

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 14 / 39

Page 28: Introduction to Quantum Secret Sharing

Classical Secret Sharing

Classical Secret Sharing

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 15 / 39

Page 29: Introduction to Quantum Secret Sharing

Classical Secret Sharing

Problem

Problem of Secret Sharing

Suppose that the president of a bank wants to give access to a vault tothree vice presidents who are not entirely trusted. Instead of giving thecombination to any one individual, it may be desirable to distributeinformation in such a way that no vice president alone has any knowledgeof the combination, but any two of them can jointly determine thecombination[7]

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 16 / 39

Page 30: Introduction to Quantum Secret Sharing

Classical Secret Sharing

(k, n) threshold scheme

In 1979, Shamir[5] introduced an idea to share a secret.The secret data D is divided into n pieces D1, D2, ...., Dn such a way:

knowledge of any k or more Di pieces is sufficient to determine secretdata D

knowledge of any k − 1 or few Di pieces leaves secret data Dundetermined

the size of each piece does not exceed the size of the original data

Di can be changed kept k fixed and without changing the data D

this scheme based upon the polynomial interpolationpolynomial of the form : q(x) = a0 + a1x+ ......+ ak−1x

k−1

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 17 / 39

Page 31: Introduction to Quantum Secret Sharing

Classical Secret Sharing

(k, n) threshold scheme

In 1979, Shamir[5] introduced an idea to share a secret.The secret data D is divided into n pieces D1, D2, ...., Dn such a way:

knowledge of any k or more Di pieces is sufficient to determine secretdata D

knowledge of any k − 1 or few Di pieces leaves secret data Dundetermined

the size of each piece does not exceed the size of the original data

Di can be changed kept k fixed and without changing the data D

this scheme based upon the polynomial interpolationpolynomial of the form : q(x) = a0 + a1x+ ......+ ak−1x

k−1

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 17 / 39

Page 32: Introduction to Quantum Secret Sharing

Classical Secret Sharing

(k, n) threshold scheme

In 1979, Shamir[5] introduced an idea to share a secret.The secret data D is divided into n pieces D1, D2, ...., Dn such a way:

knowledge of any k or more Di pieces is sufficient to determine secretdata D

knowledge of any k − 1 or few Di pieces leaves secret data Dundetermined

the size of each piece does not exceed the size of the original data

Di can be changed kept k fixed and without changing the data D

this scheme based upon the polynomial interpolationpolynomial of the form : q(x) = a0 + a1x+ ......+ ak−1x

k−1

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 17 / 39

Page 33: Introduction to Quantum Secret Sharing

Classical Secret Sharing

(k, n) threshold scheme

In 1979, Shamir[5] introduced an idea to share a secret.The secret data D is divided into n pieces D1, D2, ...., Dn such a way:

knowledge of any k or more Di pieces is sufficient to determine secretdata D

knowledge of any k − 1 or few Di pieces leaves secret data Dundetermined

the size of each piece does not exceed the size of the original data

Di can be changed kept k fixed and without changing the data D

this scheme based upon the polynomial interpolationpolynomial of the form : q(x) = a0 + a1x+ ......+ ak−1x

k−1

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 17 / 39

Page 34: Introduction to Quantum Secret Sharing

Classical Secret Sharing

(k, n) threshold scheme

In 1979, Shamir[5] introduced an idea to share a secret.The secret data D is divided into n pieces D1, D2, ...., Dn such a way:

knowledge of any k or more Di pieces is sufficient to determine secretdata D

knowledge of any k − 1 or few Di pieces leaves secret data Dundetermined

the size of each piece does not exceed the size of the original data

Di can be changed kept k fixed and without changing the data D

this scheme based upon the polynomial interpolationpolynomial of the form : q(x) = a0 + a1x+ ......+ ak−1x

k−1

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 17 / 39

Page 35: Introduction to Quantum Secret Sharing

Classical Secret Sharing

(k, n) threshold scheme

In 1979, Shamir[5] introduced an idea to share a secret.The secret data D is divided into n pieces D1, D2, ...., Dn such a way:

knowledge of any k or more Di pieces is sufficient to determine secretdata D

knowledge of any k − 1 or few Di pieces leaves secret data Dundetermined

the size of each piece does not exceed the size of the original data

Di can be changed kept k fixed and without changing the data D

this scheme based upon the polynomial interpolationpolynomial of the form : q(x) = a0 + a1x+ ......+ ak−1x

k−1

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 17 / 39

Page 36: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 18 / 39

Page 37: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

Quantum Secret Sharing(QSS)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 19 / 39

Page 38: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS scheme

In QSS scheme, it is possible to combine quantum cryptography withsecret sharing to detect whether a eavesdropper is active during the secretsharing protocol. To do this one have to apply quantum cryptographicprotocols to each of the bit strings which results from the secret sharing.By using the multipartite entanglement, it eliminates the classicalsecret-splitting procedure and can detect the eavesdropper altogether[6].

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 20 / 39

Page 39: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS using GHZ states

Hillery et al.[6] presented a QSS scheme for splitting a message into twoparts by using maximally entangled tripartite state or GHZ states. In thisscheme it allows Alice to send qubits to Bob and Charlie in such a waythat only by working together they can determine the original string. Thisscheme can be generalized for more than three parties.This is a ((2,2)) scheme.

The GHZ state ,

|ψ〉 = 1√2(|000〉+ |111〉)

Let Alice, Bob and Charlie each have one particle from the triplet.They each decide randomly in which direction they will measure anddeclare it publicly but not the result of their measurement.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 21 / 39

Page 40: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS using GHZ states

Hillery et al.[6] presented a QSS scheme for splitting a message into twoparts by using maximally entangled tripartite state or GHZ states. In thisscheme it allows Alice to send qubits to Bob and Charlie in such a waythat only by working together they can determine the original string. Thisscheme can be generalized for more than three parties.This is a ((2,2)) scheme.

The GHZ state ,

|ψ〉 = 1√2(|000〉+ |111〉)

Let Alice, Bob and Charlie each have one particle from the triplet.They each decide randomly in which direction they will measure anddeclare it publicly but not the result of their measurement.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 21 / 39

Page 41: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS using GHZ states

Hillery et al.[6] presented a QSS scheme for splitting a message into twoparts by using maximally entangled tripartite state or GHZ states. In thisscheme it allows Alice to send qubits to Bob and Charlie in such a waythat only by working together they can determine the original string. Thisscheme can be generalized for more than three parties.This is a ((2,2)) scheme.

The GHZ state ,

|ψ〉 = 1√2(|000〉+ |111〉)

Let Alice, Bob and Charlie each have one particle from the triplet.They each decide randomly in which direction they will measure anddeclare it publicly but not the result of their measurement.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 21 / 39

Page 42: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS uisng GHZ states

Defining x and y eigenstates

|±x〉 =1√2

(|0〉 ± |1〉), |±y〉 =1√2

(|0〉 ± i |1〉) (1)

from eq. 1 we can express

|0〉 =1√2

(|+x〉+ |−x〉), |1〉 =1√2

(|+x〉 − |−x〉) (2)

By using these results we can write,

|ψ〉 =1

2√

2[(|+x〉a |+x〉b + |−x〉a |−x〉b)(|0〉c + |1〉c)+

(|+x〉a |−x〉b + |−x〉a |+x〉b)(|0〉c − |1〉c)](3)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 22 / 39

Page 43: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS uisng GHZ states

Defining x and y eigenstates

|±x〉 =1√2

(|0〉 ± |1〉), |±y〉 =1√2

(|0〉 ± i |1〉) (1)

from eq. 1 we can express

|0〉 =1√2

(|+x〉+ |−x〉), |1〉 =1√2

(|+x〉 − |−x〉) (2)

By using these results we can write,

|ψ〉 =1

2√

2[(|+x〉a |+x〉b + |−x〉a |−x〉b)(|0〉c + |1〉c)+

(|+x〉a |−x〉b + |−x〉a |+x〉b)(|0〉c − |1〉c)](3)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 22 / 39

Page 44: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS uisng GHZ states

Defining x and y eigenstates

|±x〉 =1√2

(|0〉 ± |1〉), |±y〉 =1√2

(|0〉 ± i |1〉) (1)

from eq. 1 we can express

|0〉 =1√2

(|+x〉+ |−x〉), |1〉 =1√2

(|+x〉 − |−x〉) (2)

By using these results we can write,

|ψ〉 =1

2√

2[(|+x〉a |+x〉b + |−x〉a |−x〉b)(|0〉c + |1〉c)+

(|+x〉a |−x〉b + |−x〉a |+x〉b)(|0〉c − |1〉c)](3)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 22 / 39

Page 45: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS using GHZ states

This decomposition of |ψ〉 tells that if Alice and Bob get the sameresult on measurement along x direction then Charlie will have the

state(|0〉c)+|1〉c√

2; if they got different results, then Charlie will have the

state(|0〉c)−|1〉c√

2.

Effect of Alice and Bob measurement on Charlie’s state given in thetable

Alice→Bob↓

+x −x +y −y+x |0〉+ |1〉 |0〉 − |1〉 |0〉 − i |1〉 |0〉+ i |1〉+x |0〉 − |1〉 |0〉+ |1〉 |0〉+ i |1〉 |0〉 − i |1〉+y |0〉 − i |1〉 |0〉+ i |1〉 |0〉 − |1〉 |0〉+ |1〉−y |0〉+ i |1〉 |0〉 − i |1〉 |0〉+ |1〉 |0〉 − |1〉

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 23 / 39

Page 46: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS using GHZ states

This decomposition of |ψ〉 tells that if Alice and Bob get the sameresult on measurement along x direction then Charlie will have the

state(|0〉c)+|1〉c√

2; if they got different results, then Charlie will have the

state(|0〉c)−|1〉c√

2.

Effect of Alice and Bob measurement on Charlie’s state given in thetable

Alice→Bob↓

+x −x +y −y+x |0〉+ |1〉 |0〉 − |1〉 |0〉 − i |1〉 |0〉+ i |1〉+x |0〉 − |1〉 |0〉+ |1〉 |0〉+ i |1〉 |0〉 − i |1〉+y |0〉 − i |1〉 |0〉+ i |1〉 |0〉 − |1〉 |0〉+ |1〉−y |0〉+ i |1〉 |0〉 − i |1〉 |0〉+ |1〉 |0〉 − |1〉

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 23 / 39

Page 47: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

QSS using GHZ states

From the table Charlie knows about the measurements of Alice andBob(x or y) and also can determine that their result is same or notbut cannot know the results explicitly. Similarly, Bob also unable togather information about the Alice measurement without the help ofCharlie.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 24 / 39

Page 48: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

Sharing in presence of Eve

The problem of Eve is she has no knowledge about the measurement basishave been used and if she measure in the wrong basis then introduce someerror and get caught.But Eve able to entangle an ancilla with the tripartitestate that Alice, Bob and Charlie are using. The combined state of ancillaand the GHZ triplet given by,

Ψ =

1∑j,k,n=0

|jkn〉3 |Rjkn〉ξ (4)

where |jkn〉3 is the state of the three particles and |Rjkn〉ξ is anunnormalized ancilla state.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 25 / 39

Page 49: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

Sharing in presence of Eve

Let Alice, Bob, Charlie all measure in x basis. If no error occur then onemust have,

p(C = +x|A = ±x,B = ±x) = 1,

p(C = −x|A = ±x,B = ∓x) = 1(5)

where p(C = +x|A = +x,B = +x) is the probability that Charliemeasures +x given that both Alice and Bob measure +x. These implies,

P (+x,+x,−x) |Ψ〉 = 0, P (−x,−x,−x) |Ψ〉 = 0,

P (+x,−x,+x) |Ψ〉 = 0, P (−x,+x,+x) |Ψ〉 = 0(6)

where P (+x,+x,−x) projection onto the subspace of thethree-particle-ancilla Hilbert space in which Alice particle is in +x, Bob’sone is in +x and Charlie’s particle is in −x direction.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 26 / 39

Page 50: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

Sharing in presence of Eve

Using the conditions in eqn. 6,

1√2

(|000〉3 − |111〉3),1√2

(|100〉3 − |011〉3),

1√2

(|010〉3 − |101〉3),1√2

(|110〉3 − |001〉3)(7)

if these projection operator act on Ψ then it results 0.Now say, alice measure her particle in x basis and Bob and Charliemeasure in y basis. For no error,

p(C = −y|A = ±x,B = ±y) = 1,

p(C = +y|A = ±x,B = ∓y) = 1,(8)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 27 / 39

Page 51: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

Sharing in presence of Eve

which implies,

P (+x,+y,+y) |Ψ〉 = 0, P (−x,−y,+y) |Ψ〉 = 0,

P (+x,−y,−y) |Ψ〉 = 0, P (−x,+y,−y) |Ψ〉 = 0(9)

expressing conditions of eqn. 9 in z basis,

1√2

(|000〉3 − |111〉3),1√2

(|100〉3 − |011〉3),

1√2

(|010〉3 + |101〉3),1√2

(|110〉3 + |001〉3)(10)

will annihilate |Ψ〉.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 28 / 39

Page 52: Introduction to Quantum Secret Sharing

Quantum Secret Sharing

Sharing in presence of Eve

So far we have six vectors to which three-particle part of |Ψ〉 must beorthogonal. A seventh 1√

2(|100〉3 + |011〉3) occure when we demand no

error occurrence while Alice measure her particle in y direction, Bobmeasure in x direction and Charlie in y direction. These implies that |Ψ〉must be of form,

|ψ〉 =1√2

(|000〉3 + |111〉3) |R〉ξ (11)

It is in the product form of GHZ state and the ancilla, so there is noeavesdropping. If there some eavesdropping, there will be some error.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 29 / 39

Page 53: Introduction to Quantum Secret Sharing

Conclusion

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 30 / 39

Page 54: Introduction to Quantum Secret Sharing

Conclusion

Conclusion

QSS also experimentally verified for single qubit[8] and four qubitsystems[9].The main beauty of this scheme is that it can communicate securelyamong two or more parties even in the presence of an Eve.These scheme deals with teleportation and prohibit Eve by using no-cloningtheorem. By using GHZ states the scheme can be extended for four party.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 31 / 39

Page 55: Introduction to Quantum Secret Sharing

References

1 Demystifying Secrets

2 Entanglement

3 No Cloning Theorem

4 Classical Secret Sharing

5 Quantum Secret Sharing

6 Conclusion

7 References

8 Appendix

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 32 / 39

Page 56: Introduction to Quantum Secret Sharing

References

References

[1] Teleporting an Unknown Quantum State via Dual Classical andEinstein-Podolsky-Rosen ChannelsC. H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres and W. K. WoottersPhys. Rev. Lett. vol. 70, pp 1895-1899 (1993)

[2] A single quantum cannot be clonedW. K. Wootters & W. H. ZurekNature(London) 299,802(1982)

[3]Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?Einstein, A. and Podolsky, B. and Rosen, N.Phys. Rev. 47, 777-780 (1935)

[4] Quantum Computation and Quantum Information, p-25Nielson, Michael A., and Chuang, Issac L.

[5]How to Share SecretAdi ShamirCommun. ACM 22, 612 (1979)

[6] Quantum secret sharingM. Hillery, V. Buzek, A. BerthiaumePhys. Rev. A 59, 1829 (1999)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 33 / 39

Page 57: Introduction to Quantum Secret Sharing

References

References

[7] How to share a quantum secretR. Cleve, D. Gottesman, H. K. LoPhys. Rev. Lett. 83, 648 (1999)

[8]Experimental single qubit quantum secret sharingC. Schmid, P. Trojek, M. Bourennane,C. Kurtsiefer, M. Zukowski, H. WeinfurterPhys.Rev. Lett. 95, 230505 (2005)

[9]Experimental demonstration of four-party quantum secret sharingS. Gaertner, C. Kurtsiefer, M. Bourennane, H. WeinfurterPhys. Rev. Lett. 98, 020503 (2007)

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 34 / 39

Page 58: Introduction to Quantum Secret Sharing

References

Thank You

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 35 / 39

Page 59: Introduction to Quantum Secret Sharing

Appendix

Appendix A: Tenson Product

Tensor product is a way of putting vector spaces together to form largervector spaces. Denoted by |ψ〉 ⊗ |φ〉.If |ψ〉 is of m dimensional and |φ〉 is of n dimensional, then |ψ〉 ⊗ |φ〉 is ofmn dimensional.

[12

]⊗[23

]=

1 × 21 × 32 × 22 × 3

=

2346

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 36 / 39

Page 60: Introduction to Quantum Secret Sharing

Appendix

Appendix B: Quantum Gates

Pauli matrices are named after the physicist Wolfgang Pauli.

These are a set of 2 x 2 complex matrices which are Hermitian andunitary.

They look like

σ0 ≡ I ≡[1 00 1

], σ1 ≡ σx ≡ X ≡

[0 11 0

]σ2 ≡ σy ≡ Y ≡

[0 − ii 0

], σ3 ≡ σz ≡ Z ≡

[1 00 − 1

]

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 37 / 39

Page 61: Introduction to Quantum Secret Sharing

Appendix

Appendix B: Quantum Gates

Pauli matrices are named after the physicist Wolfgang Pauli.

These are a set of 2 x 2 complex matrices which are Hermitian andunitary.

They look like

σ0 ≡ I ≡[1 00 1

], σ1 ≡ σx ≡ X ≡

[0 11 0

]σ2 ≡ σy ≡ Y ≡

[0 − ii 0

], σ3 ≡ σz ≡ Z ≡

[1 00 − 1

]

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 37 / 39

Page 62: Introduction to Quantum Secret Sharing

Appendix

Appendix B: Quantum Gates

Pauli matrices are named after the physicist Wolfgang Pauli.

These are a set of 2 x 2 complex matrices which are Hermitian andunitary.

They look like

σ0 ≡ I ≡[1 00 1

], σ1 ≡ σx ≡ X ≡

[0 11 0

]σ2 ≡ σy ≡ Y ≡

[0 − ii 0

], σ3 ≡ σz ≡ Z ≡

[1 00 − 1

]

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 37 / 39

Page 63: Introduction to Quantum Secret Sharing

Appendix

Appendix C: CNOT Gate

The CNOT gate flips the second qubit (the target qubit) if and only if thefirst qubit (the control qubit) is 1.

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 38 / 39

Page 64: Introduction to Quantum Secret Sharing

Appendix

Appendix D: Hadamard Gate

The Hadamard gate acts on a single qubit.

It maps the basis state |0〉 to |0〉+|1〉√2

and |1〉 to |0〉−|1〉√2

Hadamard

Matrix, H = 1√2

[1 11 − 1

]

Arunabha Saha (CU) Sharing Quantum Secrets June 13, 2014 39 / 39