{"id":5340,"date":"2011-10-20T15:34:11","date_gmt":"2011-10-20T22:34:11","guid":{"rendered":"http:\/\/dabacon.org\/pontiff\/?p=5340"},"modified":"2011-10-20T15:34:11","modified_gmt":"2011-10-20T22:34:11","slug":"let-eve-do-the-heavy-lifting-while-john-and-won-young-keep-her-honest","status":"publish","type":"post","link":"https:\/\/dabacon.org\/pontiff\/2011\/10\/20\/let-eve-do-the-heavy-lifting-while-john-and-won-young-keep-her-honest\/","title":{"rendered":"Let Eve do the heavy lifting, while John and Won-Young keep her honest."},"content":{"rendered":"<p>Photon detectors have turned out to be an Achilles&#8217; heel for quantum key distribution (QKD), inadvertently opening the door of Bob&#8217;s lab to subtle side-channel attacks, most famously<br \/>\n<a href=\"http:\/\/arxiv.org\/abs\/1011.0105\"> quantum hacking<\/a>, in which a macroscopic light signal from Eve subverts Bob&#8217;s detectors into seeing all and only the &#8220;photons&#8221; she wants him to see. Recently <a href=\"http:\/\/arxiv.org\/abs\/1109.1473\"> Lo, Curty, and Qi<\/a> (&#8220;LCQ&#8221;) have combined several preexisting ideas into what looks like an elegant solution for the untrusted detector problem, which they call measurement-device-independent QKD.\u00a0 In brief, they let Eve operate the detectors and broadcast the measurement results, but in a way that does not require Alice or Bob to trust anything she says.<br \/>\n<a href=\"https:\/\/i0.wp.com\/dabacon.org\/pontiff\/wp-content\/uploads\/2011\/10\/MDIQKD21.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-5453\" title=\"MDIQKD2\" src=\"https:\/\/i0.wp.com\/dabacon.org\/pontiff\/wp-content\/uploads\/2011\/10\/MDIQKD21.jpg?resize=278%2C318&#038;ssl=1\" alt=\"\" width=\"278\" height=\"318\" \/><\/a><br \/>\nPrecursors of this approach include device-independent QKD, in which neither the light sources nor the detectors need be trusted (but unfortunately the detectors need to be impractically efficient) and time-reversed Bell-state methods, in which a Bell measurement substitutes for the Bell-state preparation at the heart of most entanglement-based QKD.\u00a0 It has also long been understood that quantum teleportation can serve as a filter to clean an untrusted quantum signal, stripping it of extraneous degrees of freedom that might be used as side channels.\u00a0 A recent <a href=\"http:\/\/arxiv.org\/abs\/1109.2330\">eprint<\/a> by Braunstein and Pirandola develops the teleportation approach into a mature form, in which side channel attacks are prevented by the fact that no quantum information ever enters Alice&#8217;s or Bob&#8217;s lab.\u00a0 (This paper is accompanied by an unusual &#8220;posting statement,&#8221; the academic analog of a Presidential <a href=\"https:\/\/en.wikipedia.org\/wiki\/Signing_statement\"> signing statement<\/a> in US politics.  This sort of thing ought to be little needed and little used in our collegial profession.)\u00a0 Two more ingredients bring the LCQ proposal to an exciting level of practicality:\u00a0 weak coherent pulse sources, and decoy states. In the LCQ protocol, Alice and Bob each operate, and must trust, a local random number generator and a weak coherent source (e.g. an attenuated laser with associated polarization-control optics) which they aim at Eve, who makes measurements effectively projecting pairs of simultaneously-arriving dim light pulses onto the Bell basis. If Eve lies about which Bell state she saw, she will not be believed, because her reported results will be inconsistent with the states Alice and Bob know they sent.\u00a0 The final ingredient needed to keep Eve honest, the decoy-state technique introduced by W.Y. Hwang and subsequently developed by many others, prevents Eve from lying about the efficiency of her detectors, for example reporting a successful 2-photon coincidence only when she has received more than one photon from each sender.\u00a0 Fitting all the pieces together, it appears that the LCQ protocol would work over practical distances, with practical sources and detectors, and, if properly implemented, be secure against known attacks, short of bugging or eavesdropping on the interior of Alice&#8217;s or Bob&#8217;s lab.<br \/>\nAlice and Bob still need to trust their lasers, polarization and attenuation optics, and random number generators, and of course their control software.\u00a0 It is hard to see how Alice and Bob can achieve this trust short of custom-building these items themselves, out of mass-marketed commodity components unlikely to be sabotaged. A considerable element of do-it-yourself is probably essential in any practical cryptosystem, classical or quantum, to protect it from hidden bugs. CHB acknowledges helpful discussions with Paul Kwiat, who is however not responsible for any opinions expressed here. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Photon detectors have turned out to be an Achilles&#8217; heel for quantum key distribution (QKD), inadvertently opening the door of Bob&#8217;s lab to subtle side-channel attacks, most famously quantum hacking, in which a macroscopic light signal from Eve subverts Bob&#8217;s detectors into seeing all and only the &#8220;photons&#8221; she wants him to see. Recently Lo, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dabacon.org\/pontiff\/2011\/10\/20\/let-eve-do-the-heavy-lifting-while-john-and-won-young-keep-her-honest\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Let Eve do the heavy lifting, while John and Won-Young keep her honest.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[53,63,67],"tags":[],"class_list":["post-5340","post","type-post","status-publish","format-standard","hentry","category-physics","category-quantum","category-quantum-cryptography"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/5340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/comments?post=5340"}],"version-history":[{"count":0,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/5340\/revisions"}],"wp:attachment":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/media?parent=5340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/categories?post=5340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/tags?post=5340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}