Clifford group restricted eavesdroppers in quantum key distribution

Quantum key distribution (QKD) promises provably secure cryptography, even to attacks from an all-powerful adversary. However, with quantum computing development lagging behind QKD, the assumption that there exists an adversary equipped with a universal fault-tolerant quantum computer is unrealistic for at least the near future. Here, we explore the effect of restricting the eavesdropper's computational capabilities on the security of QKD, and find that improved secret key rates are possible. Specifically, we show that for a large class of discrete variable protocols higher key rates are possible if the eavesdropper is restricted to a unitary operation from the Clifford group. Further, we consider Clifford-random channels consisting of mixtures of Clifford gates. We numerically calculate a secret key rate lower bound for BB84 with this restriction, and show that in contrast to the case of a single restricted unitary attack, the mixture of Clifford based unitary attacks does not result in an improved key rate.

[1]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[2]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[3]  Michael A. Nielsen,et al.  Quantum Computation and Quantum Information Theory , 2000 .

[4]  Hui Liu,et al.  Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.

[5]  Jie Lin,et al.  Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution , 2019 .

[6]  Norbert Lutkenhaus,et al.  Symmetries in Quantum Key Distribution and the Connection between Optimal Attacks and Optimal Cloning , 2011, 1112.3396.

[7]  William IEEE TRANSACTIONS ON INFORMATION THEORY VOL XX NO Y MONTH Signal Propagation and Noisy Circuits , 2019 .

[8]  David Jao,et al.  Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2014, J. Math. Cryptol..

[9]  John M. Martinis,et al.  Logic gates at the surface code threshold: Superconducting qubits poised for fault-tolerant quantum computing , 2014 .

[10]  D. Trotter,et al.  Metropolitan quantum key distribution with silicon photonics , 2017, 1708.00434.

[11]  M Saffman,et al.  Randomized benchmarking of single-qubit gates in a 2D array of neutral-atom qubits. , 2015, Physical review letters.

[12]  Stephen P. Boyd,et al.  Recent Advances in Learning and Control , 2008, Lecture Notes in Control and Information Sciences.

[13]  Norbert Lütkenhaus,et al.  Optimal architectures for long distance quantum communication , 2015, Scientific Reports.

[14]  Patrick J. Coles Unification of different views of decoherence and discord , 2011, 1110.1664.

[15]  C. Simon,et al.  Rate-loss analysis of an efficient quantum repeater architecture , 2014, 1404.7183.

[16]  Christoph Simon,et al.  Practical quantum repeaters with parametric down-conversion sources , 2015, 1505.03470.

[17]  Liang Jiang,et al.  Efficient long distance quantum communication , 2015, 1509.08435.

[18]  Joe Buhler Proceedings of the Third International Symposium on Algorithmic Number Theory , 1998 .

[19]  Pablo A. Parrilo,et al.  Semidefinite Approximations of the Matrix Logarithm , 2017, Foundations of Computational Mathematics.

[20]  Ivan B. Djordjevic,et al.  Secret key distillation across a quantum wiretap channel under restricted eavesdropping , 2019, Physical Review Applied.

[21]  S. Guha,et al.  Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.

[22]  Dave Cliff,et al.  In/Proceedings of the 15th IEEE International Conference on the Engineering of Complex Computer Systems/ (ICECCS 2010), Oxford , 2010 .

[23]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[24]  Nathan Walk,et al.  Optimal realistic attacks in continuous-variable quantum key distribution , 2018, Physical Review A.

[25]  Nathan Killoran,et al.  Quantum benchmarking with realistic states of light , 2012 .

[26]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[27]  L. Banchi,et al.  Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.

[28]  E Knill,et al.  Randomized benchmarking of multiqubit gates. , 2012, Physical review letters.

[29]  R. Barends,et al.  Superconducting quantum circuits at the surface code threshold for fault tolerance , 2014, Nature.

[30]  L. C. G. Govia,et al.  Bootstrapping quantum process tomography via a perturbative ansatz , 2019, Nature Communications.

[31]  Patrick J. Coles,et al.  Reliable numerical key rates for quantum key distribution , 2017, Quantum.

[32]  Norbert Lutkenhaus,et al.  Probing the Quantumness of Channels with Mixed States , 2009, 0907.0699.

[33]  R. Laflamme,et al.  Randomized benchmarking of single- and multi-qubit control in liquid-state NMR quantum information processing , 2008, 0808.3973.

[34]  Jay M. Gambetta,et al.  Process verification of two-qubit quantum gates by randomized benchmarking , 2012, 1210.7011.

[35]  Patrick J. Coles,et al.  Numerical approach for unstructured quantum key distribution , 2015, Nature Communications.

[36]  Rob Thew,et al.  Provably secure and practical quantum key distribution over 307 km of optical fibre , 2014, Nature Photonics.

[37]  M. Mariantoni,et al.  Surface codes: Towards practical large-scale quantum computation , 2012, 1208.0928.

[38]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[39]  Norbert Lütkenhaus,et al.  Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.

[40]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[41]  Nicolas Gisin,et al.  Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.

[42]  John Preskill,et al.  Quantum Computing in the NISQ era and beyond , 2018, Quantum.