1 / 69

Quantum Teleportation and Bit Commitment

Quantum Teleportation and Bit Commitment. Chi-Yee Cheung Chung Yuan Christian University June 9, 2009. What are teleportation and bit commitment?

marla
Download Presentation

Quantum Teleportation and Bit Commitment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009

  2. What are teleportation and bit commitment? (1) Teleportation: Arguably the most novel of all quantum protocols (procedures). It allows one to recreate an unknown quantum state at a remote site without physically transferring the quantum state itself.

  3. (2) Bit commitment is a primitive (basic) two-party quantum protocol which can be use as the building block of other more complicated two-party protocols. Two parties Alice and Bob…

  4. What do these two protocols have in common? Before answering this question, I will have to tell you something about density matrix

  5. It is well know that for a pure state the density matrix is simply given by For a mixed state denoted by then

  6. Given a density matrix, there are always Infinitely many different representations, e.g., and etc.

  7. Purification: A mixed state in a Hilbert space can always be written as a pure state in a higher dimension Hilbert space Such that e.g., for the mixed state

  8. If party-A applies an unitary transformation on her states orthrononmal set namely, It is easy to show that the reduced density matrix on B’s side remain unchanged. *** It must be so, otherwise one could transfer information instantaneously!

  9. Theorem: All representations of can be generated in this manner. Hughston, Jozsa, and Wooters (Phys. Lett. A 183 (1993) 14.) This property of mixed quantum states has been found to be useful in discussions related to teleportation, bit commitment.

  10. Note that, although it is impossible for party-A (Alice) to remotely change the density matrix of party-B (Bob), it is nevertheless possible for her to change the representation of instantaneously at will! All she has to do is apply an appropriate transformation on the basis in her hand.

  11. Teleportation Suppose Alice has an unknown quantum state , and in addition she shares a Bell (entangled) state with Bob: Then she can use this quantum channel to recreate at Bob’s site without sending the particle itself.

  12. It goes as follows: where and

  13. Therefore If Alice makes a “Bell measurement”, and tells Bob what she gets (say i=3 ), then Bob will be able to recreate in his lab. by making a compensating unitary transformation Note that: (1) The protocol is linear, that is, could be part of a N-particle state, so that one can teleport the whole N-particle state by repeating the above process N times. Provided, of course, Alice shares N pairs of Bell states with Bob,

  14. (2) could be a mixed state. Since as we have seen, any mixed state can be regarded as a pure state if one enlarges the Hilbert space. Question: What if the given quantum channel cannot be written as a product of Bell states? (i) How do we know if it could be used for teleportation? (ii) If so, how does one proceed?

  15. There exists no general result in the literature, and one just have to treat the problem on a case by case basis. For example, Zha and Song (Phys. Lett. A, 2007) considered the teleportation of a 2-particle state when the given channel is an arbitrary state (Alice: 1234; Bob: 56)

  16. They found that the combined state can always be recast in the form From which they conclude that if is unitary then Alice can teleport faithfully the 2-particle state. Otherwise, no.

  17. Also, Yeo and Chua (Phys. Rev. Lett. 96 (2006) 060502) found a class of so-called 4-particle genuinely entangled states which cannot be recast into a product of Bell states, but they can be used to teleport faithfully arbitrary 2-particle state. And there are others … • P.X. Chen et al, PRA 74 (2006) 032324 • J. Lee et al, PRA 66 (2002) 052318 • G. Rigolin, PRA 71 (2005) 032303 • P. Agrawal, PRA 74 (2006) 06232 • S. Muralidharan et al, PRA 77 (2008) 032321 • …

  18. However, all of the results are not general, in the sense that they work for some specifically constructed quantum channels only.

  19. .

  20. Note: (1) d is the number of unpolarized qubits in H_B (2) Local operations on H_B does not change the degree of entanglement between Alice and Bob.

  21. Conclusion: We have found a criterion which allows one to judge if any given quantum channel is good for faithful teleportation, and if so, how many qubits can it teleport.

  22. (2). Quantum bit commitment QBC is a quantum cryptographic protocol involving two parties: Alice and Bob They do not trust each other and they will do whatever it takes to gain an advantage!

  23. The security of QBC is an important issue because it can be used as the building block of various other two-party quantum protocols, such as quantum coin tossing, etc. QBC: Commitment + Unveiling

  24. Commitment phase: Alice secretly commits to a bit b = 0 or 1, which is to be revealed to Bob at a later time. To ensure that Alice will not change her mind before unveiling, Alice and Bob execute a series of quantum and classical exchanges such that in the end, Bob has a quantum state in his hand.

  25. Unveiling phase: 1. Alice reveals the value of b. 2. With some additional information from Alice, Bob uses to check whether Alice is honest.

  26. Security issues:A QBC protocol is secure if it is Binding: Alice cannot change her commitment without Bob’s knowledge. Concealing: Bob cannot find out the value of bbefore Alice unveils it.

  27. Concealing condition implies: Ideal case Non-ideal case

  28. Unconditional Security: If the protocol remains secure even when A and B had capabilities limited only by the laws of nature. (Security unaffected by any possible technological advances.)

  29. Example (1): • Alice writes b on a piece of paper and locks it in a box. • She gives the box (but not the key) to Bob as evidence of her commitment. Concealing: Bob cannot read the paper Binding: Paper is in Bob’s hand

  30. However classical BC cannot be unconditionally secure, because it’s security is always dependent on some unproven assumptions: • The box is hard to break • Bob cannot pick the lock • Etc…. How about QBC?

  31. Example (2): To commit, Alice sends Bob a sequence of qubits Where

  32. Concealing: Binding: If Alice commits to b=0 initially, she cannot open as b=1, for if she did, her chance of success on each qubit is ½, therefore the overall chance of cheating successfully is exponentially small.

  33. So naively, it seems that such a protocol is unconditionally secure!

  34. No-Go TheoremLo and Chau (1997), Mayers (1997)If a protocol is concealing, it cannot be binding at the same time.Unconditionally secure QBC is impossible as a matter of principle.

  35. Main Idea of the Proof: • Purification – Alice leaves all undisclosed classical information undetermined at the quantum level by entangling with ancillas. • Any action taken on a quantum system can be represented by an unitary transformation on system + environment (ancillas) • Needs quantum computers.

More Related