1: \documentstyle[12pt,aps]{revtex}%
2: \parskip=.4cm
3: \newcommand{\mc}{\multicolumn}
4: \newcommand{\bce}{\begin{center}}
5: \newcommand{\ece}{\end{center}}
6: \newcommand{\be}{\begin{equation}}
7: \newcommand{\ee}{\end{equation}}
8: \newcommand{\bea}{\vspace{0.25cm}\begin{eqnarray}}
9: %\newcommand{\eea}{\end{eqnarray}\newline\vspace{0.25cm}\noindent}
10: \newcommand{\eea}{\end{eqnarray}}
11:
12: \def\NCA{{Nuovo Cimento } A }
13: \def\NIM{{Nucl. Instrum. Methods}}
14: \def\NPA{{Nucl. Phys.} A }
15: \def\PLA{{Phys. Lett.} A }
16: \def\PRL{{Phys. Rev. Lett.} }
17: \def\PRA{{Phys. Rev.} A }
18: \def\PRC{{Phys. Rev.} C }
19: \def\PRD{{Phys. Rev.} D }
20: \def\ZPC{{Z. Phys.} C }
21: \def\ZPA{{Z. Phys.} A }
22: \def\JMO{Journ. of Mod. Opt.}
23: \def\PTP{{Progr. Th. Phys. }}
24: \def\LNC{{Lett. al Nuovo Cimento} }
25:
26:
27: %\input{tcilatex}
28:
29: \begin{document} \draft
30:
31: \vskip 1cm
32: PACS number: 03.67.Dd, 03.65.Bz, 03.67.Hk, 42.79.-e
33: \vskip 3cm
34:
35:
36:
37:
38: \begin{center}
39: {\bf {\LARGE Proposal of an experimental scheme for realising a translucent
40: eavesdropping on a quantum cryptographic channel}}
41: \end{center}
42:
43: \vspace{ .25cm}
44: \begin{center}
45: {M.Genovese \footnote{ \small genovese@ien.it}}
46: \\[0pt]
47:
48: Istituto Elettrotecnico Nazionale Galileo Ferraris \\[0pt]
49: Str. delle Cacce 91 \\[0pt]
50: I-10135 Torino, Italy
51: \end{center}
52:
53: \vspace{ 3.5 cm} {\large Abstract }
54: \vskip 0.5 cm
55: Purpose of this paper is to suggest a scheme, which can be realised with
56: today's technology and could be used for entangling a probe to a photon
57: qubit based on polarisation. Using this probe a translucent or a coherent
58: eavesdropping can be performed.
59: \vskip 1.7cm
60:
61:
62: In the last years quantum mechanics properties of states are assuming a
63: technological relevance.
64: Among different applications of quantum mechanics to technology the
65: possibility of transmitting absolutely confidential messages has been of
66: great interest. This is due to the possibility of creating a key for
67: encoding and decoding secret messages by transmitting single quanta
68: between two parties (usually dubbed Alice and Bob).
69: The underlying principle of quantum key distribution (QKD) is that nature
70: prohibits gaining information on the state of a quantum system without
71: disturbing it. Thus possible eavesdropping by a third party (usually dubbed
72: Eve) can be identified.
73: Since the original proposal of quantum cryptography \cite{Wiesner}, many
74: different protocols for this kind of transmission have been suggested
75: \cite{cryp}.
76:
77: For example in the BB84 scheme \cite{BB84} single photons are transmitted
78: from Alice to Bob, preparing them at random in four partly orthogonal
79: polarisation states (at $0^o$ and $90^o$, $45^o$ and $135^o$ for example).
80: Bob selects the bases for measuring the photons polarisation at random
81: too. Then Alice and Bob communicate on a classical channel the bases they
82: have used (but not the results of course): when they have used the same
83: base Bob knows what polarisation was selected by Alice and can build a key.
84: If a spy (Eve) tries to intercept the message, she will inevitably
85: introduce errors, which Alice and Bob can detect by comparing a subsample
86: of the generated key.
87:
88: In Ekert's protocol \cite{Ekert} entangled pairs are used. Both Alice and
89: Bob receive one particle of the entangled pair. Then they perform a
90: measurement choosing among at least three different directions. Again,
91: Alice and Bob communicate on a classical channel the bases they have used:
92: if measurements were performed along parallel axes they are used for
93: generating the secret key. The other measurements can be used for a test of
94: Bell inequalities. If Eve tries to eavesdrop, she inevitably affects the
95: entanglement between the two particles leading to a reduction of the
96: violation of the Bell inequalities, which allows Alice and Bob to
97: recognise the presence of the spy.
98:
99: Finally, in the B92 protocol \cite{B92}, Alice sends a state chosen between
100: two non-orthogonal states to Bob, who performs a measurement using a
101: projection on the subspaces orthogonal to the two states. Then Bob
102: publicly informs Alice when he obtained positive results (but not, of
103: course, which measurement he made). Finally they retain only bits
104: corresponding to these results.
105:
106: Other schemes have also been proposed \cite{oth}. Common characteristics of
107: all these schemes are the presence of a quantum channel, where different
108: quantum states can be transmitted, and of a classic channel which is used
109: for selecting a subsample of the transmitted states and for testing the
110: presence of an eavesdropper. If the classical channel is eliminated, Eve
111: could simply cut the quantum channel and substituting herself as Bob for
112: Alice and as Alice for Bob creating in this way two keys with the two other
113: parties.
114:
115:
116: Many different experiments have been realised using the former schemes,
117: demonstrating the feasibility of QKD up to a distance of many kilometers
118: \cite{lontano}.
119:
120: All of them are based on transmission of single photon states, where the
121: alphabet is based either on photon polarisation or on photon phase.
122:
123: Concerning the strategy of Eve for eavesdropping, the simplest one is when
124: she simply intercepts the state, which Alice has sent. Then she performs a
125: measurement on this state and finally she sends a new state to Bob
126: preparing it according to the result of the measurement.
127:
128: However, more elaborated strategies have been proposed, where Alice does
129: not stop the transmitted state, but causes it to interact with a second
130: state (an ancilla) and then obtains information about the transmitted qubit
131: thanks to the result of a measurement on the ancilla. This procedure is
132: known as translucent eavesdropping \cite{TEV}.
133:
134: Finally, Alice can use eavesdropping schemes where her probe interacts with
135: more than one of Alice's qubits. These schemes are known as coherent or
136: joint attacks \cite{CA}.
137:
138: Many interesting studies \cite{ET} have been devoted to understanding
139: general conditions for obtaining a secure transmission between Alice and
140: Bob in the presence of an eavesdropper, even using non-ideal channels.
141:
142: However, as far as we know, no practically realisable scheme for
143: translucent or coherent eavesdropping has been proposed yet.
144:
145: The purpose of this paper is to suggest a scheme which can be realised with
146: today's technology and could be used for entangling a probe to a photon
147: qubit based on polarisation. Using this probe Eve can then perform a
148: translucent or a coherent eavesdropping (causing the ancilla interact with
149: more than one transmitted qubit).
150:
151: The scheme of the eavesdropping apparatus, shown in the figure, is a
152: Mach-Zender interferometer with a Kerr cell on one of the arms inserted on
153: the quantum channel (see the figure).
154:
155: The input port of the first beam splitter is fed with a single photon of
156: vertical polarisation, which splits on the two interferometer arms. On arm
157: 1 it interacts with the transmitted qubit inside the Kerr cell.
158:
159: This has no effect except when both the photons interacting in the cell
160: have vertical polarisation ($\vert V \rangle \vert V \rangle \rightarrow
161: \vert V \rangle \vert V \rangle e^{i \phi}$) (in the following $H$ will
162: denote the horizontal polarisation).
163:
164: Let us suppose that the transmitted qubit is in the general form:
165: \be
166: \vert u \rangle = cos (\theta) \vert H \rangle + sin( \theta ) \vert V \rangle
167: \ee
168:
169: If we denote the probe photon with $ \vert p \rangle$, the final state is
170: in the entangled form:
171:
172: \be
173: \vert \Psi \rangle = { 1 \over \sqrt{2}} \left [cos (\theta) \vert H
174: \rangle \vert p \rangle_1 + sin( \theta ) \vert V \rangle \vert p \rangle_1
175: e^{(i \phi)}+
176: i \vert u \rangle \vert p \rangle_2 \right ]
177: \ee
178: where the suffixes after the probe $\vert p \rangle$ denotes the path
179: followed and where we have considered a 50 \% : 50 \% beam splitter (which
180: allows Eve to obtain the largest information on Alice-Bob transmission).
181:
182: We have thus obtained the desired entanglement between the probe and the
183: transmitted qubit, which can be used for translucent or coherent
184: eavesdropping.
185:
186:
187: The possibility of realising this scheme, and thus the interest of it,
188: derives by the fact that, although admittedly very difficult, the Quantum
189: Non Demolition (QND) detection of a single photon is at present possible
190: \cite{SI,SM}. QND measurements of { \it welcher Weg} (which path) have
191: already been achieved
192: using 100 meter long optical fiber \cite{QNDexp}. Of course, the
193: implementation
194: of the present scheme using such devices would be, even though not impossible
195: in theory, almost impossible in practice. The
196: recent discovery of new materials with very high Kerr coupling, could
197: however allow an easier and more realistic implementation of this scheme.
198: Two candidates as Kerr cell with ultra-high susceptibility to be used for
199: this scheme are the Quantum Coherent Atomic Systems (QCAS) \cite{QCAS,SI}
200: and the Bose-Einstein condensate of ultracold (at nanoKelvin temperatures)
201: atomic gas \cite{BEC}.
202: These are recent great technical improvements which could permit the
203: realisation of small Kerr cells, capable of large phase shift, even with a
204: single photon probe. In fact, both exhibit extremely high
205: Kerr couplings compared to more traditional materials. In particular, the
206: QCAS is rather a simple system to be realised (for a review see
207: \cite{Arimondo}) and thus represents an ideal candidate in this role.
208: Incidentally, one can notice that Kerr coupling can be further enhanced by
209: enclosing the medium in a cavity \cite{Agarwal}.
210: The scheme that we propose in this paper could, in principle, be used with
211: relatively small phase shifts too. However, the maximal efficiency is
212: reached when a phase shift of $\pi$ is produced on the probe by a single
213: photon. Recently a Lukin and Imamoglu's paper has shown that this result
214: can be effectively reached \cite{LU}. Experiments addressed to single
215: photon QND, using a Kerr cell, are in progress \cite{G}.
216:
217: This recent development of high coupling Kerr cell has already been applied
218: to the proposal of schemes for complete teleportation \cite{TVF},
219: for generating Schr\"odinger cats and modulating quantum interference
220: \cite{nos1,nos2}, for generating \cite{nos2} GHZ states \cite{GHZ} and for
221: realising quantum gates \cite{TVF,Chiara}.
222:
223: Incidentally, the use of a Bose condensate could also allow Eve to "stock"
224: her photon till when the other has reached Bob, using the very low
225: propagation velocity of light inside a suited Bose condensate (as low as
226: few tens of meters per second) \cite{BEC}.
227:
228: For the sake of exemplification in the following we consider the
229: application of this scheme to a simple procedure of eavesdropping on a
230: quantum channel where the BB84 protocol is used.
231:
232: Let us begin with the simple example where Bob performs measurement on the
233: base H,V or in the one at $45^o$ degrees.
234:
235: If Alice sends $H$ ($\theta = 0$), Bob measures $H$ and Eve has the state
236: \be
237: {\vert p \rangle _1 + i \vert p \rangle _2 \over \sqrt{2} }
238: \ee
239: and thus after the second beam splitter the photon will be detected by the
240: photodector D3. On the other hand, if Alice send $V$, Bob measures $V$ and,
241: for Eve, only photodetector D4 clicks.
242: In this case no transmission error is inserted on the quantum line by Eve
243: presence, while she obtains a perfect identification of the transmitted qubit.
244:
245: On the other hand, if Alice sends a photon $ \vert + \rangle = {\vert H
246: \rangle + \vert V \rangle \over \sqrt{2} }$, after the Kerr cell the
247: entangled state is:
248: \be
249: \vert \Psi \rangle = { 1 \over 2 \sqrt{2}} \left [ \vert + \rangle ( [1 +
250: e^{i \phi}] \vert p \rangle_1 + 2 i \vert p \rangle_2 )+
251: \vert - \rangle [1 - e^{i \phi}] \vert p \rangle_1 \right ]
252: \ee
253: where
254: $ \vert - \rangle = {\vert H \rangle - \vert V \rangle \over \sqrt{2} }$.
255:
256: If $\phi=\pi$, Eve has a 50 \% probability of observing the photon at D3 and
257: a 50 \% probability of observing the photon at D4.
258: Also, a 50 \% error on Bob measurement is introduced.
259:
260: The same situation happens when Alice sends a $\vert - \rangle $ photon.
261:
262: Altogether, the probability of a successful eavesdropping for Eve is
263: $p=3/4$, which leads to a capacity of the channel (Alice-Eve) \cite{dover}
264: \be
265: I_{AE} = 1 + p log_2 p + (1-p) log_2 (1-p) = 0.189
266: \ee
267: As the error rate for Bob is $1/4$, the capacity of the channel Alice-Bob
268: is $I_{AB} = 0.189$ as well.
269:
270: Of course, a careful spy will not use such a procedure which produces
271: asymmetric errors for the two bases, which can be easily identified.
272:
273: In general, if Alice sends a generic state $\vert u \rangle$ the
274: probability that Bob measures $\vert u \rangle$ as well and Eve sees a
275: photon at D3 is
276: \be
277: P^3_{uu} = 1 / 2 [ 1- cos^2 (\theta ) sin^2 (\theta) (1 -cos (\phi)) +
278: cos^2 (\theta) + cos( \phi) sin^2 (\theta)]
279: \label{P4uu}
280: \ee
281: Similarly, in the same situation Eve could observe a photon at D4 with
282: probability:
283: \be
284: P^4_{uu} = 1 / 2 sin^4 (\theta) (1- cos (\phi))
285: \ee
286: With similar notations, if Alice sends the orthogonal state :
287: \be
288: \vert v \rangle = cos (\theta) \vert V \rangle - sin( \theta ) \vert H \rangle
289: \ee
290: one has
291: \be
292: P^3_{vv} = 1 / 2 [ 1- cos^2 (\theta ) sin^2 (\theta) (1 -cos (\phi)) +
293: sin^2 (\theta) + cos( \phi) cos^2 (\theta)]
294: \ee
295: and
296: \be
297: P^4_{vv} = 1 / 2 cos^4(\theta) (1 - cos (\phi))
298: \ee
299: Finally, the probabilities corresponding to introducing an error on the
300: Alice-Bob communication are:
301: \be
302: P^3_{uv}= P^4_{uv}= P^3_{vu}= P^4_{vu}= sin^2 (\theta) cos^2 (\theta)
303: sin^2( \phi /2)
304: \label{P3uv}
305: \ee
306:
307: From Eq.s \ref{P4uu}-\ref{P3uv} it follows that if Eve uses the base
308: bisecting the two used by Alice and Bob and intercepts a fraction $\alpha$
309: of the transmitted qubits (in order to reduce the errors introduced in Bob
310: measurements), higher information is obtained. In fact, being the error
311: rate on Alice-Eve channel
312: \be
313: q_{AE}= ( P_3^{vu} + P_3^{vv} + P_4^{uu} + P_4 ^{uv}) / 2
314: \ee
315: one obtains $ I_{AE}= 0.40 \alpha $ (when $ \phi = \pi $). Furthermore, as
316: this procedure generates symmetric errors for the two bases, it is much
317: more difficult for Bob to distinguish if these derive from noise in the
318: quantum channel or by Eve's presence.
319:
320: Let us now analyse the security threshold. The error rate in the Alice-Bob
321: channel is unsafe if the mutual information in the Alice-Bob channel does
322: not exceed the minimum of the mutual information in the Alice-Eve and
323: Eve-Bob channels \cite{Eck2}:
324: \be I_{AB} \leq \min ( I_{AE} , I_{EB})
325: \ee
326:
327: This means that whenever $I_{AB}$ is greater than either $I_{AE}$ or
328: $I_{EB}$, then at least in principle there is a way for Alice and Bob to
329: distribute a string of secret information. On the other hand, if $I_{AB}$
330: is smaller than $I_{AE}$ or $I_{EB}$, no sifting procedure can make the
331: transmission safe.
332:
333: In \cite{Eck2} it was suggested that this condition may be overly cautious,
334: however in \cite{Eck3} it has been shown that this is not the case for the
335: entangled translucent eavesdropping scenario.
336:
337: In our case the information on the Eve-Bob and Alice-Eve channels are $I_{EB}=
338: I_{AE}= 0.4 \alpha $, whilst the error introduced in the Alice-Bob channel
339: becomes $q_{AB} = \alpha ( P_3^{vu} + P_3^{uv} + P_4^{uv} + P_4 ^{vu}) / 2
340: = \alpha / 4 $.
341:
342: Thus, the transmission cannot be considered safe if Eve intercepts a
343: fraction $\alpha=0.755$, or larger, of the transmitted photons.
344: This corresponds to an error rate on the Alice-Bob channel $ q_{AB} = 0.189$.
345: Of course, this error is relatively large, but one should not forget that
346: nowadays quantum channels, both in fibers or air, have huge losses.
347: Furthermore, with other protocols this value could be smaller.
348:
349: If Ekert or BB92 protocols are used, a similar analysis can be carried out.
350: Many papers with general results about eavesdropping and security of
351: quantum channels are already published \cite{ET}. We refer to them for
352: general discussion about application of translucent or joint eavesdropping
353: and conditions for obtaining a safe communication in the presence of
354: eavesdropping.
355:
356: In conclusion, we think that the proposed scheme represents an interesting
357: chance for an experimental realisation of eavesdropping on a quantum
358: channel and, as far as we know, this is the first proposal for a practical
359: realisation of translucent eavesdropping. Of course, this scheme could also
360: be used in any other situation where interaction with a qubit (represented
361: by polarisation properties of a photon) and an ancilla qubit is required.
362:
363: \vskip 1cm
364: {\bf Acknowledgements}
365:
366: \noindent We would like to acknowledge the support of MURST via special
367: programs "giovani ricercatori" Dip. Fisica Teorica Univ. Torino and of
368: Istituto Nazionale di Fisica Nucleare. Thanks are due to C. Novero for
369: useful discussions.
370:
371:
372: { \noindent {\bf References}
373: \begin{enumerate}
374:
375: \bibitem{Wiesner} S. Wiesner, Sigact News 15 (1983) 78.
376:
377: \bibitem{cryp} see for example S.J. Lomonaco, quant-ph 9811056 and ref.s
378: therein. See also "Special issue of Quantum Communication", Journ. of Mod.
379: Opt. 41, 12 (1994).
380:
381: \bibitem{BB84} C.H. Bennet and G. Brassard, Proc. of Int. Conf. Computer
382: Systems an Signal Processing, Bangalore (1984) 175.
383:
384: \bibitem{Ekert} A.K. Ekert, \PRL 67 (1991) 661.
385:
386: \bibitem{B92} C. H. Bennet, \PRL 68 (1992) 3121.
387:
388: \bibitem{oth} see for example: M. Czachor, quant-ph 9812030; A. K. Ekert et
389: al., \PRL 69 (1992) 1293; K. Shimizu and N. Imoto, \PRA 60 (1999) 157; W.
390: Tittel, H. Zbinden and N. Gisin, quant-ph 9912035.
391:
392: \bibitem{lontano} W.T. Buttler et al., quant-ph 0001088; W. Tittel et al.,
393: quant-ph 9911109; H. Zbinden Appl. Phys. B 67 (1998) 743, W.T. Buttler et
394: al, Phys.Rev.Lett. 81 (1998) 3283; A.V. Sergienko et al., \PRA 60 (1999)
395: R2622 and ref.s therein.
396:
397: \bibitem{TEV} see C.a. Fuchs and A. Peres, \PRA 53 (1996) 2038; A.K.Ekert
398: et al., \PRA 50 (1994) 1047; H.E. Brandt et al., \PRA 56 (1997) 4456 and
399: ref.s therein.
400:
401: \bibitem{CA} see C. Bennet et al., quant-ph 9611006; J.I. Cirac and N.
402: Gisin \PLA 229 (1997) 1 and ref.s therein.
403:
404: \bibitem{ET} S.M. Barnett et al., \JMO 40 (1993) 2501; S.M. Barnett and
405: S.J.D. Phoenix, \PRA 48 (1993) R5, \JMO 40 (1993) 1443; D. Deutsch et al.,
406: \PRL 77 (1996) 2818; B. Huttner and A.K. Ekert, \JMO 41 (1994) 2455;
407: K.J. Blow and S.J.D. Phoenix, \JMO 40 81993) 33; G. Brassard et al,
408: quant-ph 9906074, quant-ph9911054; E. Biham and T. Mor, \PRL 78 (1997)
409: 2256, \PRL 79 (1997) 4034.
410:
411: \bibitem{QNDexp} M.D. Levenson et al., \PRL 57 (1986) 2473; N. Imoto et al.,
412: Opt. Comm. 61 (1987) 159.
413:
414: \bibitem{SI} H. Schmidt and A. Imamoglu, Opt. Lett. 21 (1996) 1936.
415:
416: \bibitem{SM} B.C. Sanders and G.J. Milburn, \PRA 39 (1989) 694.
417:
418: \bibitem{QCAS} U. Rathe et al., \PRA 47 (1993) 4994.
419:
420: \bibitem{BEC} L. Vestergaard Hau et al., Nature 397 (1999) 594.
421:
422: \bibitem{Arimondo} E. Arimondo, in Progress in optics XXXV, E. Wolf
423: editor, Elsevier Science 1996, pag. 257.
424:
425:
426: \bibitem{Agarwal} G.S. Agarwal, Opt. Comm. 72 (1989) 253.
427:
428: \bibitem{LU} M.D. Lukin and Imamoglu, \PRL 84 (2000) 1419.
429:
430: \bibitem{G} G. Brida et al, private communication.
431:
432: \bibitem{TVF} D. Vitali et al., quant-ph 0003082.
433:
434: \bibitem{nos1} M. Genovese and C. Novero, Phys. Rev. A 61 032102 (2000).
435:
436: \bibitem{nos2} M. Genovese and C. Novero, \PLA to appear.
437:
438: \bibitem{GHZ} D.M. Greenberger et al., \PRA 82 (1999) 1345 and ref.s therein.
439:
440: \bibitem{Chiara} G. M. D'Ariano, C. Macchiavello, and L. Maccone,
441: Fortschr. Phys. {\bf 48}, 573
442: (2000).
443:
444: \bibitem{dover} R.B. Ash, Information Theory, (Dover, New York, USA 1990).
445:
446: \bibitem{Eck2} A. K. Eckert et al, \PRA 50 (1994) 1047.
447:
448: \bibitem{Eck3} H.E. Brandt et al, \PRA 56 (1997) 4456.
449:
450:
451: \end{enumerate}
452: }
453: \vfill \eject
454:
455: \newpage
456: {\bf Figure Caption}
457:
458: The Alice - Bob cryptographic channel, with the eavesdropping apparatus of
459: Eve, which is constituted of a Mach-Zender interferometer and a Kerr cell.
460: A probe photon can follow the arm of the interferometer where the Kerr
461: cell is posed or the other. If the transmitted photon has a vertical
462: polarisation the probe photon phase is changed. The observation of the
463: probe photon at photodetector D3 or D4 gives Eve information on the
464: transmitted photon polarisation.
465:
466: \end{document}
467:
468: