Turci Thesis Final
Turci Thesis Final
Scuola di Scienze
Dipartimento di Fisica e Astronomia
Corso di Laurea in Fisica
Questa tesi fornisce una panoramica sul funzionamento del sistema di Quantum Key
Distribution, nel contesto della crittografia quantistica, come una delle prime implemen-
tazioni della meccanica quantistica attraverso protocolli specifici. In particolare, viene
esaminato il modello BB84 che, tanto semplice quanto efficace, fornisce sicurezza in-
condizionata al problema della crittografia in condizioni tecnologiche ideali, grazie alle
leggi infrangibili della meccanica quantistica - tra cui il Principio di Indeterminazione
e il Teorema di No-Cloning quantistico. Queste premesse teoriche - come la creazione
di singoli fotoni perfetti, rivelatori con un’efficienza del 100%, canali senza perdite - si
traducono tutte in ostacoli nell’implementazione sperimentale del protocollo BB84 con le
tecnologie attuali: vengono analizzati i problemi e le limitazioni che ne derivano, esam-
inando le potenziali vulnerabilitá di sicurezza, come gli attacchi PNS. Di conseguenza,
con l’obiettivo di fornire una prova di sicurezza definitiva, la seguente tesi si propone di
analizzare una possibile soluzione, il Decoy State Method, che fornisce simultaneamente
sicurezza incondizionata ed elevate prestazioni. Per concludere, allo scopo di evidenziare
la praticitá del modello, i concetti introdotti vengono applicati al caso Weak and Vacuum
Decoy State, per il quale si ottiene una distanza massima per una comunicazione sicura
di 140.55 km, leggermente inferiore a quella dell’Asymptotic Case del Decoy State.
Abstract
This thesis provides an overview of the workings of the Quantum Key Distribution sys-
tem, in the context of quantum cryptography, as one of the first implementations of
quantum mechanics through specific protocols. In particular, the BB84 model is ex-
plored, which, as simple as it is effective, provides the ultimate security to the encryp-
tion problem under ideal technological conditions, thanks to the unbreakable laws of
quantum mechanics - including the Uncertainty Principle and the No-Cloning Theorem.
These ideal assumptions - such as the la creation of perfect single-photons, 100% effi-
ciency detector, channels without loss - all translate into obstacles in the experimental
implementation of the BB84 protocol with current technologies: the problems and lim-
itations involved are analyzed, examining the potential security vulnerabilities, like the
PNS attacks. Consequently, with the goal of providing an ultimate security proof, the
following thesis aims to analyze a possible solution, the Decoy State Method, which
simultaneously provides unconditional security and strong performances. To conclude,
with the purpose of highlighting the practicality of the model, the introduced concepts
are applied to the Weak and Vacuum Decoy State case, for which a maximum distance
for secure communication of 140.55km is obtained, slightly lower than the Asymptotic
Case of the Decoy State.
Contents
Introduction 1
3 BB84 Protocol 27
3.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.2 Quantum Stage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.3 Classical Stage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.4 Intercept-Resend Technique . . . . . . . . . . . . . . . . . . . . . . . . . 34
iii
iv CONTENTS
Conclusions 67
Bibliography 71
Introduction
Cryptography, from ancient Greek κρυπτóς “hidden, secret” and γραϕϵιν “to write”
is the scientific discipline of transforming information so that it is unintelligible and there-
fore useless to those who are not meant to have access to it.
Historically, the Caesar Cipher encryption method is mentioned among the earliest at-
tempts at cryptography. From simple and breakable models, over the centuries encryp-
tion protocols have become more sophisticated; one of the most notorious examples of
cryptographic algorithms was developed by the Germans in World War II, and broken
by Alan Turing’s Enigma machine.
The role of cryptography as a point of contact between scientific, social and political dis-
ciplines began to emerge. With the advent of computers and communication networks
in the 20th century, this synergy was strengthened, and attempts to create effective en-
cryption methods that corresponded to the new requirements led to the development of
the RSA model in the 1970s (named after the inventors: Rivest, Shamir and Adleman).
Basing its safety on the problem of factoring large prime numbers, the RSA algorithm is
a mathematically asymmetric protocol that has ensured security in modern cryptography
for the past 50 years. Due to the computationally challenging mathematical issue, the
safety of this method is strictly bond both with the calculation power of the eavesdropper
computer and with the conviction that a more efficient and fast algorithm to solve the
problem won’t be developed. Hence, the RSA algorithm possesses points of weakness
since it is breakable, in principle.
Quantum computing has recently been paid a lot of attention following the rapid develop-
ment of new disruptive technologies based on the most powerful features and resources of
quantum mechanics - such as quantum entanglement, teleportation, and the No-Cloning
1
2 INTRODUCTION
practical implementations, such as PNS attacks, the Decoy State Method is analyzed as
a possible solution to the above-mentioned problems, both from a security and perfor-
mance perspective.
In particular, this thesis aims to examine the special case of the Weak and Vacuum
Decoy State, comparing its key generation rate with that of the Asymptotic Case. The
goal is to argue the reasons why the Decoy State is an excellent candidate to become the
international standard in Quantum Cryptography.
The thesis is structured as follows. In Chapter 1 the profound principles that underlie
quantum mechanics and information theory are explored, laying a solid foundation for the
subsequent analysis. In Chapter 2, the functioning and classification of QKD protocols
are examined. Chapter 3 is assigned to an analytical description of the workings of
the BB84 protocol, while the classification of the eavesdropper strategies to hack the
communication channel are analyzed in Chapter 4. Chapter 5 focuses on the practical
implementations of the BB84 protocol leading to the limitations of its security, and the
PNS attack is examined. To conclude, Chapter 6 examines the Decoy State Method
applied to the BB84 protocol as a possible solution to the aforementioned problems,
with special attention to its safety and its performances.
4 INTRODUCTION
Chapter 1
In this chapter, the profound principles that underlie quantum mechanics and infor-
mation theory are explored, laying a solid foundation for the subsequent investigation
into quantum cryptography and, in particular, the BB84 protocol.
Quantum mechanics, conceived in the early 20th century, revolutionized the comprehen-
sion of the microscopic world, defying classical intuitions and revealing a plethora of new
phenomena.
Central to this framework are quantum bits, or qubits, which possess exceptional at-
tributes, including superposition and entanglement. By delving into the nature of qubits,
we aim to gain a deeper understanding of their behavior when subjected to measurements
and the inherent uncertainty that Heisenberg’s Uncertainty Principle captures. More-
over, the powerful framework of density matrices is explored, which provides a compre-
hensive formalism for characterizing the probabilistic nature and interrelationships of
quantum states. Furthermore, the profound implications of the No-Cloning Theorem is
investigated, a fundamental principle that prohibits the exact replication of arbitrary
quantum states. This theorem assumes a pivotal role in establishing the security foun-
dations of quantum cryptographic protocols.
After unveiling these concepts in a methodical manner, a detailed analysis of the BB84
protocol will be provided in the following chapters.
5
6 1. Introduction to Quantum Mechanics and Information Theory
where α and β are two complex coefficients, called probability amplitudes. They satisfy
the normalization condition |α|2 +|β|2 = 1, with |α|2 and |β|2 representing the probability
that a measure of ψ yields the value |0⟩ and |1⟩ respectively, according to the Born rule.
Thanks to that, it is possible to write α and β using the Hopf coordinates:
iδ θ
α = e cos (1.3)
2
i(δ+φ) θ
β=e sin (1.4)
2
where θ ∈ ]0; π[ and φ ∈ ]0; 2π[. In addition, since the factor eiδ is shared, it does not
affect measures of observables; thus the probability amplitudes become:
θ iφ θ
α = cos , β = e sin (1.5)
2 2
Therefore, |ψ⟩ = cos 2θ |0⟩ + eiφ sin 2θ |1⟩ [1]. Then, each qubit is depicted as a point
on the two-dimensional surface of the so-called Bloch sphere, or Poincaré sphere, shown
1.1 Qubit States 7
Figure 1.1: Visual representation of the Bloch sphere with the qubit states |0⟩, |1⟩, |+⟩,
|−⟩, |+i⟩ and |−i⟩. [2]
in Figure 1.1.
In particular, if the value θ = π/2 is chosen, the vectors lying on the equatorial
plane of the above-mentioned sphere are obtained; among those, four are of particular
importance for many protocols of quantum cryptography, like the BB84 protocol which
will be analysed in the following sections, that are achievable for appropriate choices of
the θ angle [3]:
" #
1 1 |0⟩ + |1⟩
|+⟩ = √ = √ if φ = 0 (1.6)
2 1 2
" #
1 1 |0⟩ − |1⟩
|−⟩ = √ = √ if φ = π (1.7)
2 −1 2
" #
1 1 |0⟩ + i |1⟩ π
|+i⟩ = √ = √ if φ = (1.8)
2 i 2 2
" #
1 1 |0⟩ − i |1⟩ 3π
|−i⟩ = √ = √ if φ = (1.9)
2 −i 2 2
8 1. Introduction to Quantum Mechanics and Information Theory
Thus, we have that M1 = {|0⟩ , |1⟩} contains eigenstates of σz and it is called Z basis, or
computational basis, M2 = {|+⟩ , |−⟩} contains eigenstates σx and it is called X basis, or
Hadamard basis, M3 = {|+i⟩ , |−i⟩} contains eigenstates of σy and it is called Y basis.
M1 , M2 and M3 are called mutually unbiased bases (MUB), because if a state is prepared
in one of the bases Mi and it is later measured in a basis Mj with i ̸= j, both the possible
outcomes are predicted with the same probability [3].
Formally, given two MUB belonging to a p−dimensional Hilbert space {φ1 , φ2 , ..., φp }
and {ϕ1 , ϕ2 , ..., ϕp }, the following result comes after [4, 5]:
1
|⟨φi |ϕj ⟩|2 = ∀i, j (1.12)
p
Our case of interest treats the easier situation of a two-dimensional Hilbert space with
p = 2.
In the relevant case here treated, the photons constitute the physical support of quantum
cryptography, in which information is carried by means of polarization of light that is
represented by the qubit ψ of the physical system taken into consideration. In particular,
the polarization of photons is described by two independent polarization states. For the
linear vertical and horizontal states, the Z basis is used, with |0⟩ = |H⟩ and |1⟩ = |V ⟩,
where H and V refer to the directions of the electromagnetic field oscillation. Vice versa,
the vectors belonging to the X basis describe linear diagonal states, perpendicular to each
other, |+⟩ = |D⟩ and |−⟩ = |A⟩. Finally, the vectors of the Y basis |i⟩ and |−i⟩ describe
circular states, clockwise and anti-clockwise respectively: |i⟩ = |R⟩ and |−i⟩ = |L⟩ [3].
As previously stated, the security yielded from quantum cryptography is not guaranteed
by the inability of the current computational power to break an algorithm, instead it
is insured by physical principles which act at a quantum-mechanical level, given its
1.2 Measurements and Density Matrices 9
Applying the measurement act to a system that lies in the pure state |ψ⟩, the outcome
x ∈ X is yielded with probability [1]
Mx |ψ⟩
|ψf ⟩ = p (1.15)
⟨ψ|Mx† Mx |ψ⟩
|ψ1 ⟩ , |ψ2 ⟩ , ..., |ψp ⟩ ∈ H that have probability to occur respectively of p1 , p2 , ..., pp satis-
fying the condition of pi=1 pi = 1 with pi ⩾ 0 ∀i ∈ {1, ..., p}.
P
The whole ensemble {pi ; |ψi ⟩}1,...,p therefore describes the system’s state, and the expec-
tation value of |ψi ⟩ with probability pi is interpreted as the equivalent density matrix of
the system, which is:
p
X
ρ= pi |ψi ⟩ ⟨ψi | (1.17)
i=1
Each system is associated with one and only one density matrix, but each density
matrix is not associated with one and only one quantum system.
Using the Pauli representation, it is possible to write the density operator as:
1
ρ = I + n̄ · σ̄ (1.18)
2
where σ̄ = {σx , σy , σz } and n̄ is a Bloch vector of unitary modulus for a pure qubit state.
If the state taken into consideration is a pure state, then it’s possible to claim to know
the system exactly. In this case the summation of equation (1.17) collapses to a single
term; in the case where p1 = 1 and pi = 0 ∀i ̸= 1, the density matrix is:
The ensemble is considered to exist in a mixed state if the summation contains many
terms. In addition, the following theorem holds true as a necessary and sufficient condi-
tion for ρ to be a pure state.
1.2 Measurements and Density Matrices 11
ρ2 = ρ (1.20)
Similarly, it is possible to differentiate between pure and mixed states using the def-
inition of purity.
Definition 1.2.3. Given a density matrix ρ, the purity P (ρ) is defined as:
P (ρ) = T r ρ† ρ = T r ρ2
(1.21)
In this way, the purity of a pure state is P (ρ) = 1, and the purity of a mixed state
is P (ρ) ⩽ 1.
As well as the completeness relation, these operators follow the following property:
As an example, let’s consider the case where the sender of the information, called Alice,
|0⟩+|1⟩
can select between |ψ0 ⟩ = |0⟩ and |ψ1 ⟩ = |+⟩ = √
2
.
The POVM components are [1]:
√
2
E0 = √ |1⟩ ⟨1| (1.30)
2+1
√
2 (|0⟩ − |1⟩)(⟨0| − ⟨1|)
E1 = √ (1.31)
2+1 2
E2 = I − E0 − E1 (1.32)
1.3 Uncertainty Principle 13
Thus, with three measures, we can create a POVM that sometimes differentiates the
two states without ever incorrectly identifying either one. Indeed, if the measurement
outcome is 0, the only possible measured state is |ψ1 ⟩, because ⟨ψ0 |E0 |ψ0 ⟩ = 0. Analo-
gously, if the measurement outcome is 1, the only possible measured state is |ψ0 ⟩ because
⟨ψ1 |E1 |ψ1 ⟩ = 0. However, if the outcome is 2, it is not possible to gain information about
the state since ⟨ψ0 |E2 |ψ0 ⟩ = ⟨ψ1 |E2 |ψ1 ⟩ = 21 .
where h i
⟨Â⟩ = ⟨ψ|Â|ψ⟩ = T r ρψ Â
σA2 = ⟨(Â − ⟨Â⟩)ψ|(Â − ⟨Â⟩)ψ⟩ (1.34)
h i
Â; B̂ = ÂB̂ − B̂ Â
correspond respectively to the expectation value of the observable Â, the standard devi-
ation of observable  and to the commutator between operators  and B̂.
The importance in the subject matter of quantum cryptography is the following: the
measurement of the photons polarization according to the Mi basis and according to the
Mj basis with i ̸= j correspond to two non-commuting operators. This implies that mea-
suring in Mi basis and later in Mj basis yields a different outcome, instead of executing
the measurement in Mj basis only, since uncertainty on the “Mi basis polarization” is
added.
14 1. Introduction to Quantum Mechanics and Information Theory
In this way, |0⟩ and |1⟩ are eigenstates of the P̂Z operator, with eigenvalues λ|0⟩ = +1
and λ|1⟩ = −1, representing respectively the case of transmission and reflection of the
photon. Analogously, |+⟩ and |−⟩ are eigenstates of the P̂X operator, with λ|+⟩ = +1
and λ|−⟩ = −1. If the |1⟩ state were measured in the X basis, one would obtain:
1 1
P̂X = |+⟩ ⟨+|1⟩ − |−⟩ ⟨−|1⟩ = √ |+⟩ ⟨+|+⟩ − √ |+⟩ ⟨+|−⟩
2 2
(1.37)
1 1 1 1
− √ |−⟩ ⟨−|+⟩ + √ |−⟩ ⟨−|−⟩ = √ |+⟩ + √ |−⟩
2 2 2 2
This shows the importance for the legitimate parties to use the same basis in the com-
munication procedure in order to transmit a qubit deterministically.
As will be analysed later, coherent states are crucial in the analysis of practical real-life
quantum key protocols. They are defined as particular quantum states of the harmonic
oscillator that exhibit classical motion [10], and are given by the following expression:
∞
X z n − |z|2
|z⟩ = |n⟩ √ e 2 z∈C (1.38)
n=0 n!
They saturate the levels of the Uncertainty Principle for the particle’s measure of position
and momentum, making the inequality in (1.33) an equality: ∆pz ∆qz = ℏ2 .
|X⟩B is prepared. The systems A and B share the same Hilbert space: H = HA = HB .
Hence, the copying machine starts out with the state
The quantum operator that acts on the composite system belonging to H⊗H is a unitary
operator U ; it affects the evolution of the system in the following way:
U
|ψ⟩A ⊗ |X⟩B −
→ U (|ψ⟩A ⊗ |X⟩B ) = |ψ⟩A ⊗ |ψ⟩B (1.41)
Given that unitary transformations preserve inner products, from the previous relations
one gets:
⟨ψ1 |ψ2 ⟩ = |⟨ψ1 |ψ2 ⟩|2 (1.44)
that yields either |⟨ψ1 |ψ2 ⟩| = 0 or |⟨ψ1 |ψ2 ⟩| = 1, which means that either |ψ1 ⟩ and
|ψ2 ⟩ are equal (just a phase difference) or they are orthonormal. We conclude that the
machine is able to copy only orthonormal states and not general ones.
Thus, it is possible to clone eigenstates with the respect to a certain basis, such as |ψ1 ⟩ =
|0⟩ and |ψ2 ⟩ = |1⟩ for Z, but it is not possible to do so with nontrivial linear combinations.
For example, in the physical case of our interest, it results in the impossibility of cloning
|0⟩+|1⟩
|ψ1 ⟩ = |0⟩ and |ψ2 ⟩ = √
2
because they are not orthogonal to each other.
Moreover, this is the reason why the sender and receiver of the information must use the
same basis to communicate, while an eavesdropper who does not know the bases used
fails to clone the information.
16 1. Introduction to Quantum Mechanics and Information Theory
Definition 1.5.1. Given a random variable X, which can have outcomes X1 , X2 , ..., Xn ,
with probabilities p1 , p2 , ..., pn respectively, the Shannon entropy for variable X is defined
as [7]:
X
H(X) = X(p1 , p2 , ..., pn ) = − pi log pi (1.45)
i
It can be seen that the Shannon entropy does not depend on the type of outcomes
that the variable X can take, but on their output probabilities, and thus ultimately on
the probability distribution p1 , ..., pn . To better understand its meaning, the Shannon
entropy measures the amount of information we typically learn when we discover the
outcome value Xi of the variable X. The greater the probability pi of obtaining the
outcome Xi , without any other prior information about it, the less the information
gained after the outcome occurs will be. Indeed, given a set of possible outcomes Xi ,
i ∈ {1, ..., n} with probability pi the definition of the corresponding information is Qi =
− log pi , measured in bits, and the Shannon entropy corresponds to the expectation value
of Q [11]:
X X
S = ⟨Q⟩ = Qi pi = − pi log pi (1.46)
i i
The Shannon entropy also quantifies the degree of uncertainty around X before we
find its value, thanks to the knowledge of the probability distribution. The greater the
probability pi the less will be the uncertainty of the outcome Xi and vice versa.
These two ways of viewing entropy as mean information obtained and as uncertainty
associated with an outcome overlap.
In cryptography, the random variable X to be considered often has only two possible
outcomes, i.e. the 0 and 1 classical bits, or the |0⟩ and |1⟩ qubits. In this case it is
possible to define the binary Shannon Entropy [1]:
where p is the probability of the first outcome and 1 − p of the second one.
The graph of H bin (p) is shown in Figure 1.2 where it can be seen that it has the
maximum value for p = 1/2.
Definition 1.5.3. Given two random variables X and Y , the conditional entropy H(X|Y )
is defined as follows:
XX 1
H(X|Y ) = P (x, y) log = H(X, Y ) − H(Y ) (1.48)
x∈X y∈Y
P (x|y)
Definition 1.5.4. Given two random variables X and Y , the mutual information I(X, Y )
is defined as follows:
XX P (x, y)
I(X, Y ) = P (x, y) log = H(X) − H(X|Y ) (1.49)
x∈X y∈Y
P1 (y)P2 (y)
and it is a measure of the correlation between the two variables X and Y that follow the
joint probability distribution P (x, y).
18 1. Introduction to Quantum Mechanics and Information Theory
1.6 Entanglement
At the heart of the differences between classical and quantum physics lies the concept
of quantum entanglement. Concept existing only in quantum mechanics, it asserts that
an entangled system is such that it cannot be expressed as a factorization of its elements:
there are no individual separate components but an inseparable ensemble, causing what
Einstein referred to as “spooky action at distance.”
There are additional conceivable states in the composite Hilbert space besides product
states, in particular states with interesting features that do not display such a product
shape. Quantum correlations can be seen when two (or more) parties that are separated
in space share the same quantum state. Entanglement is the term given to this phenom-
ena.
Formally, the following definition of entanglement is provided:
Definition 1.6.1. If a pure bipartite state |ψ⟩AB cannot be expressed as a product state
|ϕ⟩A ⊗ |η⟩B for every combination of states |ϕ⟩A and |η⟩B , it is said to be entangled.
Otherwise, it is said to be separable.
Definition 1.6.2. Given a bipartite system HA ⊗HB such that dim(HA ) = dim(HB ) = d
with orthonormal basis respectively {|j⟩A } and {|j⟩B }, the maximally entangled system
is
d
1 X
|Ψ⟩ = √ |jj⟩ (1.50)
d j=1
with {|j⟩A } and {|j⟩B } the orthonormal basis for the system A and B respectively. The
amplitudes λj , that are strictly positive, real, satisfying j λ2j = 1, are called Schmidt
P
1.6 Entanglement 19
coefficients. The Schmidt rank d corresponds to the number of λj and the following
relation holds:
d ⩽ min{dim(HA ), dim(HB )} (1.52)
An example of entangled state is given by the Bell states, that are four maximally
entangled two-qubits Bell states, which create a maximally entangled basis (Bell basis)
of the four-dimensional Hilbert space (two qubits). They are defined as follows:
1
Φ+ = √ |0⟩A ⊗ |0⟩B + |1⟩A ⊗ |1⟩B
2
− 1
Φ = √ |0⟩A ⊗ |0⟩B − |1⟩A ⊗ |1⟩B
2
(1.53)
1
Ψ+ = √ |0⟩A ⊗ |1⟩B + |1⟩A ⊗ |0⟩B
2
1
Ψ− = √ |0⟩A ⊗ |1⟩B − |1⟩A ⊗ |0⟩B
2
The concept of quantum entanglement plays a crucial role in quantum cryptography,
particularly in the implementation of entanglement-based protocols in quantum key dis-
tribution (QKD), enabling secure key distribution between two distant parties, as will
be examined in further sections.
20 1. Introduction to Quantum Mechanics and Information Theory
Chapter 2
The quantum key distribution (QKD) process is the best currently known method
for performing quantum cryptography operations, which is implemented through suit-
able protocols. The QKD offers the ultimate solution to the cryptography problem, in
contrast to post-quantum cryptography that would offer systems that are robust against
already known quantum algorithm. Indeed, since the latter would expose the infor-
mation to undiscovered quantum algorithms, the QKD restores the security basing on
fundamental laws of quantum mechanics and resulting from unbreakable principles of
nature, like the above-mentioned Uncertainty Principle and No-Cloning Theorem [3].
Therefore, unlike classical cryptography, this key generating mechanism is demonstrably
secure from every attack that an eavesdropper might launch.
Each QKD protocol aims to provide a shared secret key that can be used to encrypt and
decrypt messages between two authorized parties which is known only to them by means
of a public communication channel.
A quantum key distribution technique may generally be split into two distinct sections:
the quantum transmission stage taking up the first section, in which Alice and Bob send
and/or measure quantum states. The second stage is the classical post-processing phase,
where two sets of safe keys are created from the bit strings produced in the quantum
stage [1, 12].
The transmission of information by qubits according to QKD can take place in two dif-
ferent types of protocols, which differ in the properties they use. They are prepare-and-
21
22 2. Quantum Key Distribution
measure protocols that require a quantum channel to transmit the information, which
is then measured, and entanglement-based protocols, in which the legitimate parties ob-
tain a pair of entangled qubits and extract the key by measuring their subsystems. It is
possible to demonstrate [7] that each prepare-and-measure procedure corresponds to an
entanglement-based method. Since entanglement-based protocols tend to be simpler to
evaluate because they do not include quantum channels, this equivalence is very benefi-
cial for security demonstrations.
It is possible to note that in this case Alice and Bob do not communicate via a
quantum channel. This implies significant simplifications in that it makes entanglement-
based protocols easier to analyse from a security perspective; it also makes attacks by
Eve much more difficult to accomplish.
However, they possess significant practical limitations, such as the ability to realize
24 2. Quantum Key Distribution
sources that prepare perfect entangled qubits with a sufficiently high rate, which prevent
implementation in current quantum cryptosystems.
An example of entanglement-based protocols is the Ekert91 protocol.
Definition 2.3.3 (Trace Preserving). During the transmission in the quantum channel,
the trace of the state must not change:
This is a necessary condition in order to ensure that the quantum channel transforms
density operators into density operators.
Given the three above-mentioned definitions, the quantum channel is defined as fol-
lows:
2.3 Quantum Channel 25
It is important that the map is completely positive, and not simply positive. Taking
as an example the following map applying the transpose operation on a single qubit state
T : ρ →ρT
" # " #
a b a c (2.4)
→
c d b d
and considering as qubit the state
|00⟩ + |11⟩
Φ+ = √ (2.5)
2
the density operator is ρΦ+ = |Φ+ ⟩ ⟨Φ+ |, and it yields:
1 0 0 1 1 0 0 0
0 0 0 0 −
1 T ⊗id 1 0 0 1 0
−−→ (2.6)
2 0 0 0 0
20 1 0 0
1 0 0 1 0 0 0 1
The eigenvalues of the final matrix include λ = −1/2, which implies that the matrix is
not positive and therefore is not a good density operator [7].
Below the Choi-Kraus Theorem is stated, which allows the quantum channel to be de-
scribed in terms of its Kraus decompositions. For a proof see [17].
if and only if the map is linear, completely positive and trace preserving, where
ρA ∈ B(HA ), Kj : HA → HB ∀j ∈ {1, ..., d} and
d
X
Kj† Kj = IA (2.8)
j=1
ρf = U ρi U † = U(ρi ) (2.9)
(U † ◦ U)(ρ) = U † U ρU † U = ρ (2.10)
Chapter 3
BB84 Protocol
In this chapter the workings of the BB84 protocol are analysed, a pioneering method
for secure key distribution in the realm of quantum cryptography. Proposed by Charles
H. Bennett and Gilles Brassard in 1984, the BB84 protocol represents one of the most
widely used protocols in QKD because it is easy to implement and guarantees security
against eavesdropping proven on many occasions [18].
Through a meticulous exploration, it is provided a comprehensive understanding of the
key components and operational principles of the protocol. By elucidating the steps
involved in key generation, transmission, and reconciliation, the mechanisms that ensure
secure communication between two parties is explored.
This opens the way to the insights of its strengths, limitations, and potential avenues for
future advancements, that will be examined in later chapters in the thesis.
3.1 Description
Like any QKD protocol, the BB84 protocol can be divided into two stages; in the first
“quantum” stage the sender (called Alice) and the receiver (Bob) use a quantum channel
to exchange quantum states and thus create the raw encryption key, while in the second
“classical” stage, through already existing information channels, they perform a classical
post-processing operation on the sifted key and the actual exchange of information.
The BB84 protocol bases its working principle on the polarization of photons to com-
27
28 3. BB84 Protocol
Figure 3.1: Schematic of the operating principle in Quantum Key Distribution protocols.
municate information, assuming that the emitted signal is composed of single photons;
this is an assumption difficult to implement in practice, and in the next sections it will be
analysed how to take into account the practical impossibility of obtaining single photon
sources, arriving at the description of the Decoy State Method.
The quantum states used here are the qubits (1.1)(1.6)(1.7) of the Z and X bases [12],
which in this case are denoted by rectilinear and diagonal bases, respectively. A graphical
representation of the qubits is given in Figures 3.2 3.3 [19].
The classical bits 0 and 1 can be represented either in the rectilinear (+) or diagonal
(×) basis, according to the following convention:
3.2 Quantum Stage 29
Basis + Basis ×
Bit 0 0◦ 45◦
Bit 1 90◦ −45◦
Bit Preparation and Communication. Alice then prepares a series of photons, i.e.
a string of qubits based on Table 3.1 and sends them to Bob through the quantum
channel.
Bit Measurement. Similarly, Bob randomly extracts a similar string of × and + bases,
and reads the qubits received in the selected basis. Since × and + are mutually
unbiased bases, if the sender and the receiver used the same basis, and this happens
statistically half the time, the qubit Bob receives is the same as the one Alice sent,
assuming perfect calibration of the experimental apparatus. Therefore, Bob has
1/2 chance of reading the same bit sent by Alice and 1/2 chance of reading the
opposite bit.
At this point the legitimate parties both have a string of bits kAraw and kB
raw
called
raw quantum keys and which do not coincide in general.
The protocol is based on a fundamental principle: Alice and Bob’s choice of bases is
completely autonomous and unknown to any third party, such as a possible eavesdropper
Eve, who tries to obtain the bit without being discovered using the most basic intercept-
resend strategy in which she receives the information from Alice and sends it to Bob.
30 3. BB84 Protocol
Indeed, an eavesdropper cannot perfectly replicate or measure the prepared states thanks
to the non-orthogonality criterion. This is accurate because, according to the No-Cloning
Theorem, she is unable to duplicate a particle with an unknown state. She cannot
properly decode the information encoded by Alice since the × and + bases are mutually
unbiased, and her activity disturbs the quantum states in a way that can be seen by
authorized users. Without knowing the basis used, statistically, half the time Eve chooses
a different basis than Alice, and among those half of the time she measures the incorrect
bit [20, 21].
Announcement. Alice and Bob communicate to each other the strings of × and +
bases used. It is important to emphasize that there is no exchange regarding the
corresponding bits, sent by Alice or received by Bob. This occurs for the reasons
mentioned above, being that only in the case where the legitimate parties have the
same basis they are able to transmit bits to each other deterministically.
Error Rate Estimation and Creation of Secret Keys. Let’s consider P (X, Y, Z) the
joint probability distribution of three discrete random variables X, Y, Z of Alice,
Bob and Eve respectively. The sender and the receiver only have access to P (X, Y )
and with this they want to place constraints on the information Eve possesses by
going to place constraints on P (X, Y, Z).
Knowing P (X, Y, Z), there is no necessary and sufficient condition to have a secret-
key rate S(X : Y ||Z) > 0. However, it is possible to provide a lower bound on
S(X : Y ||Z) in the following way, taking into account that if Eve knows about one
random variable of the legitimate parties, then the secret-key rate must be higher
[15, 22]:
n o
S(X : Y ||Z) ⩾ max I(X, Y ) − I(X, Z); I(X, Y ) − I(Y, Z) (3.1)
32 3. BB84 Protocol
where I(X, Y ) is the mutual information between the variables X and Y . The limit
of equality is reached when it comes to one-way communication, for example, from
Alice to Bob. In two-way communication, a secret-key agreement can be reached
even when the condition (3.1) is not satisfied, which means that Eve possesses more
information than Bob. Verifying this condition is therefore necessary.
In order to establish a secret-key, Alice selects a subset of bits from the sifted key,
and compare them with Bob using the public channel in order to get the error rate
estimation. Then they discard those bits from the sifted key and verify whether
the condition (3.1) is satisfied or not. In the first case they proceed to the next
step, otherwise they abort the protocol.
Error Correction. To see the presence of errors, they usually take kAsif ted as the ref-
sif ted
erence. To detect and, consequently, correct errors present in kB they apply
error correction codes, which end with a procedure called “verification.” Among
the most commonly used error correction codes, worth mentioning are linear error
correction codes, and in particular low-density parity-check codes (LDPC)[12]. At
the end of this procedure legitimate parties obtain kAver = kB
ver
with a high level of
probability.
A simple error correction protocol can be executed in the following way [15]; Alice
and Bob choose same pairs of bits from the sifted keys and both announce their
XOR value, i.e., their exclusive disjunction, which is an operator that is false if
and only if its arguments are the same: see Table 3.2.
If Bob’s XOR value matches Alice’s XOR value, he announces “accepted,” and
they both keep the first bit of the pair and discard the second. If Bob’s value does
3.3 Classical Stage 33
not match Alice’s one, he announces “rejected” and both bits are discarded.
Eventually the legitimate parties keep sharing the same keys.
of the bits on which she performed the procedure. Both of them, at this point,
replace the pair of bits with their XOR value. In this way, the length of the key
is decreased without the possibility of introducing errors, and consequently, Eve’s
knowledge about the key is decreased. In fact, if it has partial information about
the bits, the information about their XOR values is even less. For example, if she
knows the first bit but not the second one, she has no information about the XOR
value. Otherwise, if Eve knows the value of both bits with 70% probability, she
knows the XOR value with 0.72 + 0.32 = 58% probability.
This last point ends the “classical” stage, and thus the BB84 protocol with the production
of the encryption key.
to it θ⊥ . At this point it is her intention to deduce the state |ψ⟩ after the classical
stage announcement, using Bayes’ theorem [1, 24]:
P |θ⟩ | |ψ⟩ · P |ψ⟩
P |ψ⟩ | |θ⟩ = P (3.2)
j P |θ⟩ | |ψj ⟩ · P |ψj ⟩
However, after the announcement phase the possible values of |ψj ⟩ can be either |ψ⟩ or
ψ ⊥ , hence:
P |θ⟩ | |ψ⟩ · P |ψ⟩
P |ψ⟩ | |θ⟩ = (3.3)
P |θ⟩ | |ψ⟩ · P |ψ⟩ + P |θ⟩ | |ψ ⊥ ⟩ · P |ψ ⊥ ⟩
For the reasons mentioned above, P |ψ⟩ = P ψ ⊥ = 1/2, and the expression becomes
P |ψ⟩ | |θ⟩ = P |θ⟩ | |ψ⟩ .
3.4 Intercept-Resend Technique 35
In the special case where |ψ⟩ = |1⟩, when Alice uses the Z basis,
2
2 θ iϕ θ
P |1⟩ | |θ⟩ = |⟨1|θ⟩| = cos ⟨1|0⟩ + e sin ⟨1|1⟩
2 2
(3.4)
2 θ
= sin
2
On the other hand, if Alice uses the X basis, in the case where |ψ⟩ = |+⟩, we have:
2
2 θ 1 iϕ θ 1
P |+⟩ | |θ⟩ = |⟨+|θ⟩| = cos √ ⟨0|0⟩ + e sin √ ⟨1|1⟩
2 2 2 2 (3.5)
1 sin θ cos ϕ
= +
2 2
Eve’s uncertainty on Alice’s encoding is measured by Shannon’s entropy, depending on
the basis used; thus, we have [3]:
2 θ 2 θ 2 θ 2 θ
HEve = − cos
Z
· log2 cos − sin · log2 sin (3.6)
2 2 2 2
1 + sin θ cos ϕ 1 + sin θ cos ϕ
HEve = −
X
· log2
2 2
(3.7)
1 − sin θ cos ϕ 1 − sin θ cos ϕ
− · log2
2 2
It is possible to see that if the eavesdropper uses θ = 0 then HEve
Z
= 0, and the un-
certainty in the measurement is minimized in the case where the sender uses Z basis;
however, this induces a maximum value of HEve
X
, i.e. the case where Alice uses X basis.
Decreasing the uncertainty for HEve
Z
increases the uncertainty for HEve
X
, and vice versa.
This agrees with the fact that X and Z are two mutually unbiased bases, in which,
measuring in one basis, maximizing information gain maximizes the uncertainty for the
complementary basis.
The only way to minimize both uncertainties for HEve
Z
and HEve
X
is to use two different
bases for measuring the polarization of photons, which should match Alice’s choices; one
solution might be to randomly choose the bases and discard the events for which they
do not match: this is exactly Bob’s situation.
The legitimate parties exchange maximal information, while Eve has a gain information
of 1/2. If the eavesdropper makes a measurement using Z basis, while Alice and Bob
36 3. BB84 Protocol
use X basis, the probability that Eve records the same bit sent by Alice is 50%, and the
probability that Bob receives the same bit as Eve is 50%. Consequently, the legitimate
parties detect a 25% error in their keys. However, Eve can apply her strategy to a small
number of bits sent by Alice, such as 10%. In this way Eve gets information of about
5%, but the error rate will be approximately 2.5% [3].
In addition, it is possible to consider the case where θ = π/4, since we have HEve
Z
= HEve
X
.
Assuming that the sender and the receiver use Z basis, then Eve projects Alice’s qubit
to |θ⟩ with probability cos2 (π/8) and to θ⊥ with probability sin2 (π/8). In the former
case Bob measures the erroneous qubit with probability sin2 (π/8), in the latter with
probability cos2 (π/8). To conclude, the error rate is 2 cos2 (π/8) sin2 (π/8) = 0.25, as in
the previous case.
In summary, from the physical point of view the BB84 protocol is based on 4 principles
and ideal assumptions:
• The channel has no loss, but there is noise present that disrupts the signal, and on
which the eavesdropper relies to leak the information without being detected;
• The alignment between the sender and the receiver is perfect. This implies that
the rectilinear and diagonal bases are perfectly rotated at 45◦ to each other.
With these starting assumptions, several security proofs of the BB84 method have been
formulated that ensure safety against eavesdropping. Among these, worth mentioning
are the security proofs of Mayers, Biham et al., Ben-Or and Shor-Preskill.
However, these are unrealistic assumptions, and we will see how to account for a weak-
ening of some of the starting assumptions by taking into account the state of current
technology, so as to see how to arrive at a secure model of quantum cryptography that
is at the same time also practical for the means at hand.
Chapter 4
37
38 4. Eavesdropping Strategies and Attacks Classification
Hence:
′ ′
⟨ψ10 |ψ01 ⟩ = ⟨ψ10 |ψ01 ⟩ ⟨Eψ10 |Eψ01 ⟩ (4.5)
′ ′
Given a fixed value of ⟨ψ10 |ψ01 ⟩, the smaller ⟨Eψ10 |Eψ01 ⟩ is, the bigger ⟨ψ10 |ψ01 ⟩ is, meaning
that the states are more distinguishable, and vice versa. It implies that the more the
eavesdropper gather information the bigger the disturbance will be, resulting to Eve’s
detection.
ρE = T rA U † ρA |E⟩E ⟨E| U
(4.6)
40 4. Eavesdropping Strategies and Attacks Classification
After that, the eavesdropper measures the ancillary system, which is given by a POMV
M = {Mi } where the outcome Mi of measuring a generic state ρ comes out with proba-
bility Pi = T r(Mi ρ).
Let’s consider the case of individual attacks, in which Eve attaches individual probes to
each qubit and performs a measurement to her probes one at the time. Alice sends n
states, labelled ρ1A , ρ2A , ..., ρnA and Eve attaches the ancillary system |E⟩E ⟨E| to each ρiA ,
i ∈ {1, ..., n}. She then performs the unitary operation via the unitary operator U , and
after that, the ancillary state in this case is expressed as:
Joint attacks, which are the most common coherent attacks, are based on the assumption
that Eve attaches a single probe to each qubit, like in individual attacks, yet is capable
of measuring multiple probes coherently, like in coherent attacks.
With this type of strategy, the only degree of freedom is the unit operation via the U
operator that is applied on the composite system. Considering the computational basis
M1 = {|0⟩ ; |1⟩} for Alice, then we have:
√ √
U |0⟩ |E⟩ = F |0⟩ |E00 ⟩ + 1 − F |1⟩ |E01 ⟩
√ √ (4.9)
U |1⟩ |E⟩ = F |1⟩ |E11 ⟩ + 1 − F |0⟩ |E10 ⟩
where |E⟩ represents the initial state of the ancilla, and |E10 ⟩ |E00 ⟩ |E01 ⟩ |E11 ⟩ its possible
final states. F is a coefficient, called fidelity that represents the probability that Bob,
working in the same M1 basis as Alice, will get the correct qubit, that is, the one actually
sent to him; 1 − F thus represents the probability of measuring the wrong qubit. Also,
in this case, F coincides with the definition of fidelity between Alice’s initial state, |ψin ⟩,
and the final state that Bob obtains, ρB :
Definition 4.2.1. Given two quantum states σ, ρ ∈ B(H) the fidelity is defined as
follows: q 2
1 1
F (σ, ρ) = T r σ 2 ρσ 2 (4.10)
In this case, the sender’s state is a pure state, thus σ = |ψin ⟩ ⟨ψin |, and consequently
the definition is simplified to:
h p i2
F (|ψin ⟩ , ρ) = T r |ψin ⟩ ⟨ψin | ρ |ψin ⟩ ⟨ψin |
p 2
= ⟨ψin |ρ|ψin ⟩ T r |ψin ⟩ ⟨ψin | (4.11)
= ⟨ψin |ρ|ψin ⟩
and if ρ is a pure state too, with ρ = |ϕ⟩ ⟨ϕ|, hence F (σ, ρ) = |⟨ϕ|ψin ⟩|2 .
For the BB84 protocol, it was shown [25] that the mutual information between Alice
and Eve and between Alice and Bob is expressed in terms of the so-called disturbance
D = 1 − F , which is a measure of the unwanted changes or alterations that occur to a
quantum system during its transmission in cryptographic protocols. Since the fidelity
quantifies the similarity between the input state and the output state of a cryptographic
operation, hence representing the probability of successfully transmitting or receiving the
information without any undesired alterations, the disturbance represents the probability
42 4. Eavesdropping Strategies and Attacks Classification
Therefore, the BB84 protocol’s safety requirement against individual attacks becomes:
Figure 4.1: Representation of the mutual Figure 4.2: Representation of the dif-
information between Alice and Bob, and ference in mutual information I(A, B) −
Alice and Eve. The threshold value is I(A, E). It becomes negative when D =
D = 14.6%. 14.6%
The aforementioned demonstration is only legitimate and appropriate if the key is signifi-
cantly longer than the total amount of coherently attacked qubits, therefore the Shannon
information employed constitutes averages over a large number of independent realiza-
tions of classical random variables [15]. This means that the legitimate parties are able
to use the aforementioned demonstration to protect keys considerably longer than n0
bits, providing Eve can coherently attack a huge yet finite number n0 of qubits.
Chapter 5
In this section, practical implementations of the BB84 model are analyzed. As previ-
ously seen, the analysis so far has been based on ideal assumptions, such as transmission
of perfect single photons, no loss in the communication channel, 100% efficiency in the
detectors, and perfect alignment of the experimental apparatus.
In the practice of the experiment, however, with a view to extending quantum com-
munication to the commercial level, it is necessary to analyze the security of protocols
with these limitations. It will be seen in the following paragraphs that in order to avoid
security problems, the BB84 protocol can be implemented in the Decoy State Method,
which provides in-principle security of communication.
45
46 5. Practical Implementations and Limitations
where |j⟩, with j ∈ N, is the so called Fock-state or number state, representing the state
with a number of j photons, and α = |α|eiφ with |α| and φ called respectively amplitude
and phase of the coherent pulse.
The parameter of the coherent state is α ∈ C, while the pulse intensity is defined to
√
be µ = |α|2 , thus α = µeiφ .
The method asks for a random phase shift of the coherent state for every pulse. This is
done by either attaching an additional component to the sender’s optical device that is
connected to a generator of random numbers and modifies the phase (active randomiza-
tion) or by using a laser mode of operation (passive randomization)[12]. Since the phase
gets uniformly distributed, a pulse state is therefore described by the density matrix:
Z 2π
1
ρSource = |α|eiφ |α|eiφ dφ
2π 0
Z 2π ∞ ′
1 −|α|2
X |α|j+j iφ(j−j ′ )
= e √ ′ e |j⟩ ⟨j ′ | dφ (5.2)
2π 0 j,j ′ =0
j!j !
∞ 2j ∞
X
−|α|2 |α|
X µj
= e |j⟩ ⟨j| = e−µ |j⟩ ⟨j|
j=0
j! j=0
j!
As a result, the eavesdropper and the receiver measure a superposition of coherent states
defined in equation (5.1).
Therefore, the state containing j photons is transmitted with a probability of [3]:
µj
pj = e−µ (5.3)
j!
Because of this, the variable µ that is the average photon number of the pulse follows
the Poisson distribution. These pulses are known as weak coherent pulses since µ ≪ 1
is usually selected.
Considering that the laser closely follows the Poisson photon statistic, a weak laser pulse
with µ ≪ 1 nevertheless possesses a probability of producing more than one photon in a
5.2 Channel 47
5.2 Channel
Earlier it has been stated that the channel does not possess loss and that noise
remains the only factor that can disturb the signal, allowing Eve to quietly leak data. It
is important to remember that this is an ideal assumption and channel loss needs to be
considered while using any QKD protocol.
The variable α, represented in dB/km, and the fiber characteristic length l, can be
employed to determine the loss rate of the quantum channel in QKD protocols based on
optical-fiber. The channel’s transmittance, tAB , is defined as follows [29]:
αl
tAB = 10− 10 (5.4)
In signal transmission, the choice of wavelength is crucial, and in general there are
two possibilities. The first choice is a wavelength of about 800nm, which is the wave-
length for which commercially available photon detectors are efficient; in this case the
medium for communication must be either free-space or a special type of optical fiber,
which, however, is not the one used in today’s telecommunications optical fibers.
The second choice is a wavelength between 1300nm and 1550nm, as it is compatible with
existing and already used optical fibers. However, in this case there would be a need to
develop new detectors sensitive to this type of wavelength, as silicon semiconductors are
transparent to signals above 1000nm.
48 5. Practical Implementations and Limitations
Taking the above into account, let’s analyze the absorption of the fibers in the two
cases. With wavelengths of 1300nm and 1550nm, the attenuation is 0.35dB/km and
0.20dB/km, respectively, so there is a 50% loss of signal after 9km and 15km; on the
other hand, with wavelengths of 800nm, the channel loss is 2 dB/km, so 50% attenuation
after just 1.5 km.
In optical fibers, channel loss as a function of signal wavelength is depicted in Figure 5.1,
[15].
Figure 5.1: Representation of the channel loss expressed in dB/km as a function of the
signal wavelength, for optical fibers (Gisin et al., 2002, pp. 158).
5.3 Detector
The detector, which is the final element in the transmission process, is flawed as well.
It demonstrates that the detection efficiency of Bob’s (and consequently Eve’s) detector
5.4 Photon-Number-Splitting Attack (PNS) 49
is below 100%.
Taking the variable ηB denoting the transmittance in Bob’s side, considering the trans-
mittance of the optical components tB and the efficiency of the detector ηD [29],
ηB = tB ηD (5.5)
Therefore, the overall transmission and detection efficiency η between Alice and Bob is
determined by
η = tAB ηB (5.6)
The idea of a threshold detector in the receiver’s component is quite common. Bob’s
sensor is consequently assumed to be able to tell the difference between a vacuum and
a non-vacuum scenario. It is hard to figure out the specific number of photons in the
pulse in the case it contains more than one photon.
It is plausible to suppose that the actions of the i photons in i−photon states are inde-
pendent of one another. In regard to a threshold detector, the transmittance associated
with the i−photon state ηi thus gets provided by [30]
In addition, detector efficiency induces the possibility of so-called dark-counts: Bob de-
tects photons in the signal even though it does not contain them. It has been seen
above how with µ = 0.1 the probability that the signal does not contain photons is
P (0) ≃ 90.5%; therefore, the effect of an efficiency η ̸= 1 has a great impact on the key
production and signal transmission, and must be taken into account in the discussion.
results in a decrease in the signal rate, since Eve cannot obviously obtain useful informa-
tion if no photons are sent. The problematic situation arises in the case where multiple
photons are transmitted, and, if there is loss in the transmission channel as in practical
implementations, Eve is capable of performing the so-called Photons-Number-Splitting
(PNS) attacks against the BB84 protocol under those realistic conditions.
If the sender sends weak coherent state with Poisson distribution parameter µ and the
communication channel possesses a transmittance η, then the receiver will observe sig-
nals with photons distributed according to the Poisson statistic with parameter µ · η,
under the assumption that both µ and η are known. Thus, the probability of observing
a non-vacuum signal with at least one photon inside is equal to Pnon−vac = 1 − e−µ·η .
The eavesdropper must extract information from the signal sent by Alice, but at the
same time it must ensure that Bob receives coherent states with the same expectation
value of getting non-vacuum signals: if Bob receives non-vacuum signals with a fraction
different from the expected one, Eve will be detected.
In order to provide an ultimate security proof for cryptographic protocols, highlighting
all possible future critical issues arising from technological advancement, let’s consider
the case where the eavesdropper has unlimited technological capabilities (such as the
ability to perform quantum non-demolition measurements or store photons in a quan-
tum memory) and is limited only by the laws of quantum mechanics.
After establishing Eve’s inability to copy photons received from Alice due to the No-
Cloning Theorem, Eve can only retain photons, with the consequence that Bob will
observe signals with decreased parameter µ. If µ · η needs to remain constant, Eve re-
places the communication channel with an ideal one with zero loss, or at least with a
more efficient one.
Afterwards it performs the so-called quantum non-demolition measurements on the sig-
nals coming from Alice, so it is able to count the number of photons within a signal
without disturbing their polarization. At this point, Eve acts differently depending on
the number of photons present within each signal [7]:
• The vacuum states are transmitted to Bob without being retained, since Eve is
unable to extract information from them.
• If she receives multi-photon signals, she retains one photon and transmits the
5.4 Photon-Number-Splitting Attack (PNS) 51
remaining ones to Bob through the channel without altering their polarization.
However, Eve does not immediately measure the polarization of the photon she
kept, but waits for the moment in the protocol in which Alice reveals to Bob the
bases used through the public channel. In this way she is able to perform the
correct measurement and extract information. In this step, it is assumed that
the eavesdropper has such a technology that it can store photons in a quantum
memory.
• From the signals that contain a single photon, Eve blocks a portion of them so as to
ensure that Bob gets detection events with the probability he expects: Pnon−vac =
1 − e−µ·η . Instead, the remaining ones are retained by Eve, on which she performs
any kind of attack to extract information.
The quantity of losses rises as a consequence of the eavesdropper stopping certain
pulses, which may be seen by the rightful parties. In order to replicate the amount
of loss that occurs naturally, it is thus assumed that the eavesdropper is able to
substitute the communication channel and the sensors with ideal ones in order to
stop the maximum number of single-photon signals as feasible. The greater number
of single-photon pulses Eve can block, the greater the degree of intrinsic losses
will be. The eavesdropper would acquire complete knowledge of the information
without adding noise in the event the channel’s intrinsic losses were so great that
she could stop all single-photon states from occurring [12]. This is because all the
pulses that arrive to Bob would be multi-photon pulses.
Figure 5.2: Schematic of Eve’s behaviour according to the number of photons present
within each signal coming from Alice.
current techniques [31]. Afterward, she has to hold the photon as long as the legitimate
parties declare the basis used in the communication. In theory, a loop with an ideal
and lossless channel might accomplish this [15]. The eavesdropper might also be able to
associate the photon with a quantum memory.
Although a quantum memory doesn’t exist at the moment, it may well be available at a
later time. Knowing that the legitimate parties might potentially wait for minutes before
revealing the bases, it should be noted that the quantum memory requires basically infi-
nite decoherence time. Furthermore, the eavesdropper has to connect to a channel that
is lossless, or with smaller losses than the channel employed by the legitimate parties.
The most difficult part could be that.
The technical capabilities of communications fibers have already been reached. Rayleigh
scattering, that is inevitable when the Schrödinger equation is solved in an inhomoge-
neous material, is the primary cause of the loss [15].
Ideal lossless fibers are challenging to envision if the discrepancies are brought on by the
medium’s molecular structure. The minimum value of 0.18 dB/km in silica fibers with a
wavelenght of 1550 nm is determined more by physics than by technology. The attenu-
ation at telecommunications wavelengths is fairly significant, therefore using air is not a
practical approach. Because of diffraction, another necessary physical phenomenon, vac-
5.4 Photon-Number-Splitting Attack (PNS) 53
uum, the only environment in which Rayleigh scattering cannot occur, has constraints
as well. The eavesdropper appears to have just two options remaining at this point. She
can either employ teleport or change the photons’ wavelength without disturbing the
qubit. These two approaches seem unlikely to be implemented in the near future.
However, in an ultimate security proof the realistic implementation of the BB84 method
is not secure since vulnerable to PNS attacks; a possible solution to that problem could
be found in the Decoy State Method, described in the following section.
54 5. Practical Implementations and Limitations
Chapter 6
Since it is necessary to take into account the vulnerabilities that arise from practical
implementations of Quantum Key Distribution protocols such as BB84, arising from the
use of coherent source of light and loss in the communication channels, it is required
to ask whether they can be remedied by effective countermeasures to counter possible
actions of eavesdroppers.
The solution to the weaknesses brought by Photon-Number-Splitting attacks performed
by Eve, for the BB84 protocol, is provided by the Decoy State Method, which is analyzed
in this section.
As will be pointed out later, implementing the Decoy State Method on a protocol such as
the BB84 with coherent source of light is easy in terms of technology [7, 30]; moreover,
the Decoy State Method guarantees excellent performances from the point of view of
the communication transmission, obtaining estimates on the maximal secure distance
for communication that exceeds the best values reported in the literature for protocols,
such as BB84, without the Decoy State.
Consequently, since the Decoy State BB84 QKD protocol has been examined in detail
both from a theoretical [32, 33, 34] and a practical [35, 36] point of view, including
Russian internal systems [37], considering its high level of security and the possibility of
having a very high key generation rate at large distances, it is an excellent candidate to
become the protocol implemented in commercial applications as an international stan-
dard.
55
56 6. Decoy State Method
Yield. The yield Yn of the n−photon state is defined as the conditional probability that
Bob’s detector has a detection event if Alice sends an n−photon state.
Consider the yield Yn for a realistic setup, differentiating the cases according to
the value of n.
n = 0. In this case, the probability that Bob has a detection event with 0 photons
sent by Alice is denoted by Y0 , and is given by the probability pdark , i.e.
the background rate due to background contribution and background noise:
Y0 = pdark , and therefore it is such that Y0 ⩾ 0.
n ⩾ 1. The probability of having a detection event for an n−photon state can be
caused either by a background event pdark or by an actual reception of the
n−photon state signal, the rate of which is provided by ηn , defined in equation
(5.7).
Thus, we have:
Yn ≃ ηn ≃ n · η (6.2)
Gain. The gain is a variable that quantifies the transmission efficiency of coherent states
used in quantum key distribution protocols, and it plays a key role in determin-
ing the quality of the encryption key that is generated: high values of the gain
58 6. Decoy State Method
correspond to high communication efficiency, thus high key quality that allows in-
formation to be transmitted over large distances.
The gain of an n−photon coherent state is defined as the product of Alice’s proba-
bility of sending an n−photon coherent state and the conditional probability that
Bob will have a detection event if Alice sends an n−photon state:
µn
Qn = Yn pn = Yn e−µ (6.3)
n!
The total gain is the sum over n, number of possible photons in the coherent states,
of the Qn ’s:
∞ ∞
X X µn
Qµ = Qn = Yn e−µ = Y0 + 1 − e−ηµ (6.4)
n=0 n=0
n!
Quantum Bit Error Rate (QBER). The Quantum Bit Error Rate is a variable that
quantifies the errors that happen in the transfer of qubits in a QKD protocol, and
it represents an important factor that establishes the level of quality of the encryp-
tion key that is created.
Some of those qubits might get damaged or lost in the communication as a con-
sequence of the noisy channel, leading to mistakes. As a result, the QBER is
expressed as the percentage of mistakes to all qubits sent during transmission.
Therefore, the QBER must be maintained as low as feasible to guarantee the in-
tegrity of the key.
Let the QBER relative to an n−photon state be defined as follows [29]:
e0 Y0 + edetector ηn
en = (6.5)
Yn
where e0 and Y0 are, respectively, the QBER and the yield of the 0−photon state,
Yn the yield of the n−photon state, and edetector is a constant value, independent of
n that indicates the probability of the signal hitting an erroneous detector . With
this definition, contributions to en of both erroneous detections and background
contributions are taken into account.
Supposing that the background event rates of the two detectors are equal, the result
6.1 Model Description and Security 59
is completely random and the error rate is 50% [30]. In other words, e0 = 1/2 is
the QBER value for the vacuum state.
The total QBER for a coherent state is Eµ and the following relationship holds:
∞
X µn −µ
Qµ Eµ = en Yn e = e0 Y0 + edetector (1 − e−ηµ ) (6.6)
n=0
n!
As mentioned above, the eavesdropper cannot distinguish decoy states from signal
states, since they possess the same characteristics (such as wavelength and timing in-
formation) and is only capable of counting the number of photons per pulse. From the
definitions above, it can be seen that the yield Yn and the QBER en do not depend on
the signal intensity µ, and thus on the distribution of the number of photons, but only
on the number of photons in the signal state. We thus arrive at the essence of the Decoy
State Method, which can be set forth in the following two equations [30]:
In a general and ideal situation Alice can vary the intensity of the pulses µ by creat-
ing, as a result, an infinite number of decoy states with different Poissonian parameter
than the signal state. In the next sections it will be shown how few decoy states are
actually sufficient. When these signals arrive to Bob, the legitimate parties are able
to experimentally determine the specifications of the communication channel, then to
determine the overall QBER Eµ and gain Qµ .
From the equations (6.4) and (6.6) it is possible to see how the relationships between
Qµ ’s and Yn ’s and between Eµ ’s and en ’s, respectively, are linear.
Consequently, given the set of variables Qµ ’s and Eµ ’s that the legitimate parties obtain
experimentally, Alice and Bob are able to determine with a high level of confidence the
range within which the solution sets {Y0 , Y1 , ..., Yn } and {e0 , e1 , ..., en } lie, then to find a
range of acceptance of Yn ’s and en ’s, simultaneously and for each n.
As mentioned earlier, if Alice and Bob use the Decoy State BB84 Method, any attempt
by Eve to perform a PNS attack would involve a change in the values of Yn ’s and en ’s
that would necessarily be detected by Alice and Bob, implying Eve being detected and
60 6. Decoy State Method
the protocol to abort. For Yn ’s and en ’s to fall within the expectation range of the legit-
imate parties following a PNS attack, Eve has very little power to act, which is useless
for the purpose of decrypting the information.
This shows how the Decoy State Method may represent a solution to the problem of
PNS attacks in the case of real implementations of the BB84 protocol.
where q is a constant that depends on the protocol used (for the BB84 protocol it is 1/2
since in half of the cases Alice and Bob generate discordant bases in the first phase);
6.2 Advantages in Key Rate Generation 61
Eµ and Qµ are respectively the overall QBER and gain of the signal state that has µ as
its relative intensity; Q1 and e1 are respectively the gain and QBER for single photon
states; H(p) is the binary Shannon Entropy defined in equation (1.47) and, finally, f (x)
is the efficiency of bi-direction error correction (for an example, see [39]) as a function
of Eµ : normally f (x) ⩾ 1 with Shannon limit f (x) = 1 [29].
Let’s consider a realistic situation in which Y0 ≪ η and η ≪ 1, being the realistic values
Y0 ≃ 10−5 and η ≃ 10−3 .
In this situation we have
η1 = η
Y1 = η
Qµ = ηµ (6.10)
Eµ = e1 = edetector
Q1 = ηµe−µ
Then the key generation rate, with q ≃ 1 for a generic QKD protocol, becomes:
n o
−µ
R ≃ q −ηµf (edetector )H(edetector ) + ηµe 1 − H(edetector ) (6.11)
62 6. Decoy State Method
Therefore:
∂R f (edetector )H(edetector )
=0 ⇒ e−µopt 1 − µopt = (6.12)
∂µ µ=µopt 1 − H(edetector )
Afterwards, considering the parameters taken from some recent experiments [40, 41]
provided in Table 6.1, we may solve this equation and determine that µGY
opt
S
≃ 0.54 for
f (e) = 1 and µGY S
opt ≃ 0.48 for f (e) = 1.22 [29].
After finding the optimal values for the intensity µ of the signal state, we proceed to
maximize the value of the key rate R with the decoy states. Looking at the equation
(6.8), one realizes that the only term that depends on {Yi } and {ei } is Q1 1 − H(e1 ) ,
the term one must work on in order to maximize R.
Accordingly, we must proceed to find the lower bound for Y1 , and the upper bound for
e1 .
As is shown in [30, 42] a few decoy states are sufficient to obtain good results for R, and
here the case with two decoy states is analyzed.
Let us consider two decoy states with intensities ν1 and ν2 such that
Consequently, by taking ν1 Qν2 − ν2 Qν1 we are able to obtain the lower bound for the
background rate Y0 :
ν2 ν1 Y2 Y3 2 2
ν1 Qν2 e − ν2 Qν1 e = (ν1 − ν2 )Y0 − ν1 ν2 (ν1 − ν2 ) + (ν1 − ν2 ) + ...
2! 3! (6.15)
⩽ (ν1 − ν2 )Y0
Therefore
ν1 Qν2 eν2 − ν2 Qν1 eν1
Y0 ⩾ = max Y0L ;0 (6.16)
ν1 − ν2
where the equality holds when ν2 = 0, that is when one decoy state is a vacuum state.
We now proceed to calculate the lower bound for Y1 . For contributions from multi-photon
states of signal states, the following relation holds:
∞
X µi
Yi = Qµ eµ − Y0 − Y1 µ (6.17)
i=2
i!
As a result we get:
∞ ∞
ν1 ν2
X Yi X Yi
Qν1 e − Qν2 e = (ν1i − ν2i ) = Y1 (ν1 − ν2 ) + (ν1i − ν2i )
i=0
i! i=2
i!
∞ (6.18)
X Yi ν1i ν2i i
= Y1 (ν1 − ν2 ) + ( − )µ
i=2
i! µi µi
At this point we use the property for which ai − bi ⩽ a2 − b2 if 0 < a + b < 1 and i ⩾ 2,
ν1 ν2 ν1i ν2i
where in this case a = µ
, b= µ
, and ai = µi
, bi = µi
. Thus
∞
ν1 ν2 ν12 − ν22 X µi
Qν1 e − Qν2 e ⩽ Y1 (ν1 − ν2 ) + Yi
µ2 i=2
i!
ν2 − ν2 h i
(6.19)
= Y1 (ν1 − ν2 ) + 1 2 2 Qµ eµ − Y0 − Y1 µ
µ
2
ν − ν2 h i
⩽ Y1 (ν1 − ν2 ) + 1 2 2 Qµ eµ − Y0L − Y1 µ
µ
64 6. Decoy State Method
In this way the legitimate parties are able to obtain a lower bound for Y1 and an up-
per bound for e1 and consequently they are able to compute the key generation rate by
substituting their values:
n h io
L,ν1 ,ν2 U,ν1 ,ν2
R ⩾ q −Qµ f (Eµ )H(Eµ ) + Q1 1 − H(e1 ) (6.25)
Once this result is obtained, it is possible to proceed analyzing the quality of the bounds
found, and consequently the performance of the model with two decoy states.
It is possible to examine the special case, called the Asymptotic Case, in which ν1 → 0
and ν2 → 0, with ν2 < ν1 ≪ µ = O(1). Taking the above limits yields the following
results [29]:
e0 Y0 + edetector η
Y1L,ν1 ,ν2 = Y0 + η and eU,ν
1
1 ,ν2
= (6.26)
ν1 ,ν2 →0 ν1 ,ν2 →0 Y1
6.2 Advantages in Key Rate Generation 65
Since in this limit the formulas (6.1)(6.5) are obtained again, the Asymptotic Case of the
model with two decoy states is as good as the most general possible protocol, analyzed
above, with an infinite number of decoy states. However, the Asymptotic Case has
the disadvantage that in practice it is necessary to have at least one between ν1 and
ν2 with a finite value. Moreover [29] shows how, fixing a finite value of ν1 , the key
generation rate is maximized when ν2 = 0, that is, when the second decoy state is
a vacuum state. Consequently, we come to establish the fundamental importance in
practical developments held by the model Weak and Vacuum Decoy State, proposed in
[30].
The Weak and Vacuum Decoy State is a special case of the Two Decoy State with
ν2 → 0. Presented in [30] and analyzed in [43], it provides excellent values for the
performances in communication, achieving high values of key generation rate for long-
distance communication.
Alice is able to generate the vacuum state by simply turning off its photon source. For
the vacuum state the legitimate parties are able to estimate:
1
Qvac = Y0 and Evac = e0 = (6.27)
2
The second decoy state that Alice realizes has a small but finite intensity value ν. For
the weak decoy state the legitimate parties are able to compute the lower bound for Y1
and gain Q1 , and the upper bound for e1 by taking the limit with ν2 → 0 respectively of
the formulas (6.20) (6.21) (6.24):
ν2
µ
Y1L,ν,0 Y1L,ν,ν2 ν µ L
Y1 ⩾ = = Qν e − 2 Qµ e − Y0 (6.28)
ν2 →0 µν − ν 2 + µ
µ2 e−µ ν2
Q1 ⩾ QL,ν,0 = QL,ν,ν ν µ L
1 1
2
= Qν e − 2 Qµ e − Y0 (6.29)
ν2 →0 µν − ν 2 + µ
Eν Qν eν − e0 Y0
e1 ⩽ eU,ν,0
1 = eU,ν,ν
1
2
= (6.30)
ν2 →0 νY1L,ν,0
This gives the lower bound for the key generation rate R:
n h io
L L,ν,0 U,ν,0
R = q −Qµ f (Eµ )H(Eµ ) + Q1 1 − H e1 (6.31)
66 6. Decoy State Method
Taking into consideration the data from the GYS experiment given in Table 6.1, the
optimal value of the signal state intensity µ = 0.48 for f (e) = 1.22, ν = 0.05, and
looking at the BB84 model for which q = 1/2, we obtain the lower bound of the key
generation rate as a function of distance, the graph of which is depicted in Figure 6.1.
Figure 6.1: The red dashed line represents the lower bound of R in the Asymptotic Case
situation, following equation (6.8) for which the maximum safety distance is 142.05km.
The black continuous line represents the Weak and Vacuum Decoy State situation, fol-
lowing equation (6.31) with µ = 0.48, f (e) = 1.22, ν1 = 0.05 and ν2 = 0. The other
variables are taken from the GY S experiment reported in Table 6.1. ([29])
As can be seen, this yields a maximum distance for which communication is secure of
140.55km [29], a value slightly lower than the Asymptotic Case, which concerns the most
generic case with an infinite number of decoy states (hence with the best performances),
for which a maximum distance of 142.05km is obtained.
Conclusions
The present study set itself the goal to present an analysis in the field of quantum
cryptography, and in particular an analytical description of the implications to con-
sider when technological limitations arise in the application of quantum key distribution
(QKD) protocols.
The QKD process is the best currently known method for performing quantum cryptog-
raphy operations, which is implemented through suitable protocols. Indeed, it offers the
ultimate solution to the cryptography problem, in contrast to post-quantum cryptogra-
phy that would offer systems that are robust against already known quantum algorithm,
thus creating only temporary solutions. While the latter would expose the information to
undiscovered quantum algorithms, the QKD restores the security basing on fundamental
laws of quantum mechanics and resulting from unbreakable principles of nature, like the
Uncertainty Principle and No-Cloning Theorem.
The BB84 model is the protocol taken as a reference, which, as simple as effective, is
demonstrably secure from every attack that an eavesdropper might launch. Proposed
in 1984 by Charles Bennett of IBM and Gilles Brassard of The University of Montréal,
it bases its security in the exchange of communication between the legitimate parties
on the laws of quantum mechanics mentioned above; however, the procedures for the
creation of the encryption key require ideal assumptions that are difficult to implement
in practice: the creation of perfect single-photon source, channel without loss, 100%
detector efficiency. These assumptions all translate into obstacles in the experimental
implementation of the BB84 protocol with current technologies, especially if the goal is
to realize secure communication networks, commercial and financial applications and the
protection of sensitive infrastructures, where both security and communication perfor-
67
68 CONCLUSIONS
[2] W. Smythe, March 15, 2021. “The Bloch sphere and eigenstates with their super-
positions” [Online]. Available from: https://logosconcarne.com/2021/03/15/
qm-101-bloch-sphere/[Accessed 23 June 2023].
[4] I. Bengtsson, “Three Ways to Look at Mutually Unbiased Bases”, AIP Conference
Proceedings 889, 40-51 (2007). DOI:https://doi.org/10.1063/1.2713445
[6] K. Jacobs, “Quantum Measurement Theory and its Applications”. Cambridge Uni-
versity Press (2014). DOI:https://doi.org/10.1017/CBO9781139179027
71
72 BIBLIOGRAPHY
[11] S.J. Blundell, and K.M. Blundell, “Concepts in Thermal Physics”, Oxford Univer-
sity Press (2009). DOI:10.1093/acprof:oso/9780199562091.001.0001
[12] A.S. Trushechkin, E.O. Kiktenko, D.A. Kronberg, A.K. Fedorov. “Security of the de-
coy state method for quantum key distribution”, Uspekhi Fizicheskikh Nauk Journal.
Phys. Usp. 64, 88 (2021). DOI:https://doi.org/10.48550/arXiv.2101.10128.
[18] IEEE Computer Society, Indian institute of science (Bangalore), IEEE Circuits
and Systems Society “International Conference on Computers, Systems Signal
Processing”, Steering Committee (1984). DOI:https://books.google.com/books?
id=JZetpwAACAAJ
[20] W. Wootters, W. Zurek, “A single quantum cannot be cloned ”, Nature 299, 802-803
(1982). DOI:https://doi.org/10.1038/299802a0.
[21] J. Ortigoso “Twelve years before the quantum no-cloning theorem”, American Jour-
nal of Physics 86, 201-205 (2018). DOI:https://doi.org/10.1119/1.5021356
[22] I. Csiszar and J. Korner. “Broadcast channels with confidential messages”, IEEE
Transactions on Information Theory 24, 339-348 (1978). DOI:10.1109/TIT.1978.
1055892
[23] Y.-G. Yang, P. Xu, R. Yang, Y.-H. Zhou, W.-M. Shi, “Quantum Hash function
and its application to privacy amplification in quantum key distribution, pseudo-
random number generation and image encryption”, Scientific Reports 6, 19788
(2016). DOI:10.1038/srep19788.
[25] C.A. Fuchs, N. Gisin, R. B. Griffiths, C-S Niu, A. Peres, “Optimal eavesdropping
in quantum cryptography. I. Information bound and optimal strategy”, American
Physical Society, Phys. Rev. A 56, 1163 (1997). DOI:10.1103/PhysRevA.56.1163
[26] C.M. Caves, C.A. Fuchs, R. Schack, “Unknown quantum states: The quantum
de Finetti representation”, Journal of Mathematical Physics 43, 4537 (2002).
DOI:https://doi.org/10.1063/1.1494475
74 BIBLIOGRAPHY
[27] J.I Cirac, N Gisin, “Coherent eavesdropping strategies for the four state quantum
cryptography protocol ”, Physics Letters A 229, 1-7 (1997). DOI:https://doi.org/
10.1016/S0375-9601(97)00176-X
[29] X. Ma, B. Qi, Y. Zhao, H.-K. Lo, “Practical decoy state for quantum key distribu-
tion”, American Physical Society. Phys. Rev. A 72, 012326 (2005). DOI:10.1103/
PhysRevA.72.012326
[30] H.-K. Lo, X. Ma, K. Chen, Kai. “Decoy State Quantum Key Distribution”, American
Physical Society. Phys. Rev. Lett. 94, 230504 (2005). DOI:10.1103/PhysRevLett.
94.230504
[33] Z. Zhang, Q. Zhao, M. Razavi, X. Ma, “Improved key-rate bounds for practical decoy-
state quantum-key-distribution systems”, American Physical Society, Phys. Rev. A
95, 012333 (2017). DOI: 10.1103/physreva.95.012333
[35] E. Diamanti, H.-K. Lo, B. Qi, Z. Yuan, “Practical challenges in quantum key distri-
bution”, Springer Science and Business Media, npj Quantum Information 2, 16025
(2016). DOI: 10.1038/npjqi.2016.25
[36] H.-K. Lo, M. Curty, K. Tamaki, “Secure quantum key distribution”, Springer Science
and Business Media, Nature Photonics 8, 595-604 (2014). DOI: 10.1038/nphoton.
2014.149
[38] D. Gottesman, H.-K. Lo, N. Lutkenhaus, J. Preskill, “Security of quantum key dis-
tribution with imperfect devices”, International Symposium on Information Theory,
Quant.Inf.Comput. 5, 325-360 (2004). DOI: 10.1109/ISIT.2004.1365172
[43] X.-B. Wang, “Decoy-state protocol for quantum cryptography with four different
intensities of coherent light”, American Physical Society, Physical Review A 72,
012322 (2005). DOI: 10.1103/physreva.72.012322