Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Strong Monogamy and Genuine Multipartite Entanglement Gerardo Adesso Informal Quantum Information Gathering 2007 The Gaussian Case Quantum Theory group.
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Quantum Cryptography Cryptography Quantum Key Distribution.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Spin chains and channels with memory Martin Plenio (a) & Shashank Virmani (a,b) quant-ph/ , to appear prl (a)Institute for Mathematical Sciences.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
Trojan-horse attacks on practical continuous-variable quantum key distribution systems Imran Khan, Nitin Jain, Birgit Stiller, Paul Jouguet, Sébastien.
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Niels Bohr Institute Copenhagen University Eugene PolzikLECTURE 5.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
E n t a n g l e m e n t Teleportation Alice and Bob Nonlocal influences Fidelity (a) Paranormal phenomena (b) Men are from Mars. Women are from Venus (c)
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Cryptography Week-6.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Secure storage of cryptographic keys within random volumetric materials Roarke Horstmeyer 1, Benjamin Judkewitz 1, Ivo Vellekoop 2 and Changhuei Yang 1.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Jian-Wei Pan Decoherence-free sub-space and quantum error-rejection Jian-Wei Pan Lecture Note 7.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Steering in the Gaussian World Ioannis Kogias, A. Lee, S. Ragy and G. Adesso University of Nottingham To appear on arXiv: [quant-ph]
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Optics II – Cozumel December 2004 Quantum key distribution with polarized coherent states Quantum Optics Group Instituto de Física “Gleb Wataghin”
Quantum Cryptography Antonio Acín
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Optics VI Krynica Unconditional quantum cloning of coherent states with linear optics Gerd Leuchs, Vincent Josse, Ulrik L. Andersen Institut.
Carmen Porto Supervisor: Prof. Simone Cialdi Co-Supervisor: Prof. Matteo Paris PhD school of Physics.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Institute of Physics (IOP), Bhubaneswar
CIT 380: Securing Computer Systems
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Single particles quantum cryptography.
M. Stobińska1, F. Töppel2, P. Sekatski3,
ICNFP, Kolymbari, Crete, Greece August 28 – September 5, 2013
Weak Value Assisted Quantum Key Distribution
with Weak Measurements
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Unconstrained distillation capacities of
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Bits and Bobs: The Quantum Theory of Information
Study of nonlocal correlations in macroscopic measurement scenario
CV Cryptography Using a Bidirectional Quantum Channel
Quantum Cryptography Alok.T.J EC 11.
DEPARTMENT OF COMPUTER SCIENCE
Quantum Information with Continuous Variables
Quantum Information Theory Introduction
STREAM CIPHERS by Jennifer Seberry.
Quantum Cryptography Scott Roberts CSE /01/2001.
Information-Theoretic Security
Cryptology Design Fundamentals
Presentation transcript:

Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo International Conference on Quantum Physics and Nuclear Engineering March 14-16, 2016 London, UK Importance and Applications of Infinite Dimensional Non-Orthogonal Quantum State Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo March 15, 2016

Main Topics in Talk 1. Basis of Quantum Optics Quantum Optical Field Quantum Entanglement of Q-mode 2. Quantum Information Science :QIS Basis of QIS Main Theorems in QIS 3. Applications of QIS Quantum Methodology/Radar (Quantum Radar Camera) 2. Quantum Enigma Cipher

Basis of Quantum Optics Quantum Optical Field Quantum Entanglement of Q-mode

Quantum Optical Field Glauber unified classical and quantum theory for Optical Field Quantum mode ( -mode) Mode function 1.Observable in mode 2. Quantum state in mode=> Infinite dimensional Hilbert Space

2. Basic quantum state of -mode =Non orthogonal state 2.1 Coherent state (R.Glauber, PRB-1,1963) Over completeness Non-orthogonality 2.2 Two-photon coherent state (Squeezed state) (H.Yuen, PRA-13,1976) Over completeness

3. Glauber-Sudarshan representation (R.Glauber, PR-130,1963) 3. Glauber-Sudarshan representation (E.Sudarshan, PRL-10,1963) First Order Mutual coherence function Higher Order Mutual coherence function New Applications

Basis of Quantum Optics Quantum Optical Field Quantum Entanglement of Q-mode

Bell States vs Quasi Bell States (1) Complete Entanglement Entangled state for non-orthogonal state In general, it does not have Complete Entanglement

H-state Bell States vs Quasi Bell States (2) Quasi Bell state based on non-orthogonal state O.Hirota, Proc. of  QCMC, 2000 H-state Complete Entanglement

Entanglement of -mode 1. Two mode squeezed state 2. General entangled coherent state (R.Mecozzi,P.Tombesi, J.Opt.Soc.Am.,1987) (B.Sanders, PRA-45,1992) These do not have Complete Entanglement

3. Concrete example of H-State in mode Quasi Bell Entangled Coherent State O.Hirota, Proc. of QCMC, 2000 Complete Entanglement More detailed properties of H-state have been given by S.van Enk, O.Hirota, PRA , vol- 64, 2001

Quantum Information Science Our Philosophy All technological functions can be realized by Classical Physics. Some functions can be enhanced by Quantum Physics QIS supports the realization for the enhancement

Q-bit Q-mode Basis of Quantum Information Science Microscopic phenomena Macroscopic phenomena Q-bit Q-mode Orthogonal state Non-Orthogonal state Strong quantum effect Weak quantum effect

Quantum Information Science Main Theorems in Quantum Information Science Theorems on non-orthogonal states in QIS Indistinguishability of non-orthogonal state by quantum measurement (C.W.Helstrom 1967, A.S.Holevo 1973, H.P.Yuen 1978, O.Hirota 1982) 2. Channel capacity of Gaussian channel (A.S.Holevo-M.Sohma-O.Hirota, PRA-59, 1998) 3. No-cloning of non-orthogonal state by Unitary operation (W.Wootters,-W.Zurek, Nature-229,1982) 4. Quantum data compressing in non-orthogonal states (B.Schumacher, PRA-51,1995)

Applications of Q-mode 1. Quantum Methodology/Radar 2. Quantum Enigma Cipher

1. Quantum Methodology/Radar -Applications of Correlation- Target detection Quantum Illumination (entanglement) noisy case Quantum Reading (entanglement) without noise Target imaging Quantum Ghost Imaging (entanglement, discord) Quantum Radar Camera

A Quantum Illumination Two mode squeezed light reflection (S.Lloyd, Science-321,2008) (S-H.Tan et al, PRL-101,2008) Two mode squeezed light  target A signal External noise reference reflection Decision for existence of target Entanglement receiver

Quantum Reading (Quantum DVD) S.Pirandola, (PRL-106,2011) defined the model. H -state  target Phase shift signal reference reflection H-State provides Error Free quantum reading: There is no effect of Uncertainty Principle in quantum measurement. (Helstrom receiver) Decision for phase shift (O.Hirota, Bulletin of Quantum ICR Research Institute, 2011 and quant-ph arXiv:1108.4163,2011)

Quantum Radar Camera for Auto Motive Theoretical Back Ground To synthesis moving object under turbulence Theoretical Back Ground Quantum (Ghost) Imaging (A.Belinskii, and D.Klyshko, Sov.Phys.JETP-78,1994) Full-quantum phenomena Semi-quantum phenomena Classical phenomena (T.Pittman,et al, PRA-52,1995) (A.Gatti, et al, PRL-90,2003) (J.H.Shapiro, PRA-78,2008) Unified theory (B.Erkmen, J.H.Shapiro, PRA-77,2008) (N.Hardy, J.H.Shapiro, PRA-84,2011)

Design Theory under Turbulence Unified Theory for Ghost Imaging through Turbulence Phenomenological theory Reformulation by “Space-Time Quantum Wiener Receiver Theory” for Quantum Gaussian Space

Model of Moving Object under Turbulence Quasi –Lambert Reflection Space-Time Wiener Receiver Auto motive

Simulation of Generalized Wiener receiver Degradation parameter Length =100 m Acceptable in applications Synthesized flame Real object flame Refractive index The result is not so bad

We can expect to realize Pedestrian detection fog fog Stereo Camera Reflected wave Radar Camera Source Image Synthesizer Monitor Monitor

2. Quantum Enigma Cipher Yuen’s protocol (Y-00 or ah ) Application of Indistinguishability of non-orthogonal state by quantum measurement Yuen’s protocol (Y-00 or ah ) Alice and Bob share a priori information such as secret key Bob can receive coherent state signals without error with shared a priori information such as secret key Eve cannot avoid error in her receiving without shared a priori information such as secret key Quantum Enigma Cipher (Generalization of Y-00) With Randomization that enhances the quantum effect (O.Hirota, K.Kurosawa, Quantum Inf. Processing, vol-6,2007)

Implementation of system Bob Alice Symmetric key cipher (Old Enigma cipher) Shared secret key Shared secret key Key expansion by Mathematical function Key expansion by Mathematical function Transmission line Synchronization to detection of non-orthogonal states as data signals Randomization of non-orthogonal states as data signals Eve Secret key and data are hidden by quantum noise from un-matched detection of non-orthogonal states Complete Error Error free data

Security of Quantum Enigma Cipher Sets of Coherent state which convey the data (Plaintext) are scrambled by Mathematical cipher. If Eve can receive the correct ciphertext of the mathematical cipher consisting of coherent state signals, then the security of the system is equivalent to Mathematical cipher. But ciphertext of mathematical cipher is hidden by quantum noise Based on the miss-matched receiver of Eve without initial key. Thus, the systems exceed the Shannon limit of cryptography. That is, QEC is stronger than One Time Pad. Initial key problem: QKD is meaningless, because QKD also requires initial secret key before it starts.

Why do we need Quantum Enigma Cipher Washington DC Tokyo Data rate is 1 Gbit/sec ~100 Gbit/sec Optical fiber Protocol analyzer Attacker’s Server Tapping Technology by USA Storage the whole data S. V. Kartalopoulos,, John Wiley & Sons. Decrypted by Computer or Mathematical analysis

Protect against Attack Quantum Enigma Cipher Washington DC Tokyo 1 Gbit/sec ~100 Gbit/sec Optical fiber Protocol analyzer Attacker’s Server Secret key and data are hidden by quantum noise from miss-matched detection of non-orthogonal states

Thank you for your attention