Next Article in Journal
A Digital Image Confidentiality Scheme Based on Pseudo-Quantum Chaos and Lucas Sequence
Next Article in Special Issue
Beyond the Limits of Shannon’s Information in Quantum Key Distribution
Previous Article in Journal
Minimum Spanning vs. Principal Trees for Structured Approximations of Multi-Dimensional Datasets
Previous Article in Special Issue
Open-Destination Measurement-Device-Independent Quantum Key Distribution Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem

1
Faculty of Design Technology, Osaka Sangyo University, 3-1-1 Daito-shi, Osaka 574-8530, Japan
2
Independent Researcher, Chiba 263-8522, Japan
3
Faculty of Science and Engineering, Doshisha University, 1-3 Kyotanabe-shi, Kyoto 610-0394, Japan
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(11), 1275; https://doi.org/10.3390/e22111275
Submission received: 7 October 2020 / Revised: 30 October 2020 / Accepted: 9 November 2020 / Published: 11 November 2020

Abstract

:
We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.

Graphical Abstract

1. Introduction

In the quantum state discrimination problems, one tries to discriminate the quantum states by performing the single measurement. Several strategies exist, e.g., in [1,2,3] and Section 9.1.4 in [4]. On the other hand, in the mean-king’s problem [5], one can use not the single measurement but also post-information. Specific setting of the mean-king’s problem is often told as a tale [6] of a king and a physicist Alice. In the tale, Alice prepares a qubit in an initial state at first. The king performs a measurement with one of observables σ x , σ y , σ z on the qubit and obtains an outcome. Then, Alice obtains an outcome by performing a measurement on the qubit. After the measurement, the king reveals the observable he has measured as the post-information. Then, Alice tries to guess king’s outcome by using her outcome and the post-information. A solution to the problem is a pair of the initial state and Alice’s measurement such that she can guess king’s outcome correctly. Using Aharonov–Bergman–Lebowitz rule [7], a solution which consists of Bell state and a measurement on a bipartite system has been shown [5]. As an application of the solution to the mean-king’s problem, a quantum key distribution protocol (QKD) has been shown [8]. In this protocol, Alice and the king employ the guessing result as a secret key, and security analysis of the protocol has been considered [8,9,10,11].
A QKD protocol by using mean multi-kings’ problem has been shown [12] (see Section 2 for details). In this protocol, Alice and kings (called King 1 , King 2 , …, King n ) are legitimate users. Alice guesses each king’s measurement outcome by using her measurement outcome and post-information from each king; then, each guessing result is shared as a secret key between Alice and each king. The protocol has superior aspects, such as the number of measurements, state preparation and key discarding, to several realizations (whose components are the QKD protocol by using the mean-king’s problem or BB84 protocol [13]) for Alice and each king to share the secret key. In the case of n = 2 , security analysis against a simple attack so called intercept-resend attack has been considered and error rate of bits shared between Alice and the kings has been shown.
In this paper, we consider a relation between information gain by an eavesdropper (called Eve) and disturbance contained in the legitimate users’ information in the QKD protocol by using the mean multi-kings’ problem. In BB84 protocol, such relation is known as the so-called information disturbance theorem [14,15,16,17,18]. According to the theorem, Eve’s information gain in a basis inevitably induces disturbance contained in the legitimate users’ information in the conjugate basis. Therefore, the theorem is also regarded as an information theoretical version of the uncertainty relation. The theorem also plays an important role in the proof of the unconditional security [19]. We consider that Eve tries to extract information by employing an attack which she performs any measurement on her quantum system at any time after interacting the quantum system with kings’ qubits after their measurements in the case of n = 2 . In this setting, we give trade-off inequalities between distinguishability of quantum states corresponding to the bit sequences for Eve and error probability of the bit sequences shared with Alice and the kings. Our inequalities show that Eve’s extracting information regarding the secret keys inevitably induces disturbing the states of kings’ qubits and increasing the error probability even though the post-information and Alice’s qubit are used in the guessing step, unlike BB84 protocol.
This paper is organized as follows. In the next section, we review a description of the quantum key distribution protocol by using the mean multi-kings’ problem. In Section 3, we give the description of the protocol in the case of n = 2 . In Section 4, we give the outline of the attack and the trade-off inequalities between distinguishability and disturbance. Finally, we summarize this paper in Section 5.

2. Protocol

Let us start by introducing the essence of the mean multi-kings’ problem and the QKD by using it. Alice and King 1 , King 2 , …, King n are the characters in this problem. The problem can be summarized as follows. Alice prepares a composite system, which consists of her system and n systems for kings, in an initial state. Each king performs a measurement on his system and obtains an outcome. After kings’ measurement, Alice performs a measurement on the composite system and obtains an outcome. Furthermore, each king reveals post-information: the measurement type he has performed. Immediately, Alice guesses kings’ outcomes by using her outcome and the post-information from each king. A solution to the problem is defined as a three-tuple of the initial state, Alice’s measurement, and a guessing function such that she can guess kings’ outcomes correctly. In this problem, the initial state will be changed depending on the kings’ measurements and outcomes. In general, it is impossible to distinguish the changed states correctly. Therefore, Alice tries to get some potential answers by performing the measurement and to narrow down the correct outcome from them by using the guessing function of her outcome and the post-information.
We can construct the QKD protocol by using a setting of the mean multi-kings’ problem and a solution to it, i.e., Alice and each king share the guessing result as a secret key. Figure 1 is a graphically demonstrated protocol. Let us consider a setting that Alice prepares a composite system which consists of n + 1 qubits and each king performs one of two fixed measurements on his qubit. Then, two solutions where the initial states are multipartite entangled states can be shown as described below; therefore, we can also construct the QKD protocol by using those solutions. In the QKD, Alice and each king try to share secret keys while she switches the solutions.
Before introducing details of the QKD protocol, we introduce some preliminary definitions, the setting of the mean multi-kings’ problem, and the solutions to it. Define
Z 0 : = | 0 0 | , Z 1 : = | 1 1 | , X 0 : = | 0 ¯ 0 ¯ | , X 1 : = | 1 ¯ 1 ¯ |
for | 0 : = ( 1 , 0 ) T , | 1 : = ( 0 , 1 ) T , | 0 ¯ : = 1 2 ( 1 , 1 ) T , | 1 ¯ : = 1 2 ( 1 , 1 ) T . Define an outcome set
K : = { ( s 1 , t 1 , s 2 , t 2 , , s n , t n ) s j , t j { 0 , 1 } } ,
operators for ( s 1 , t 1 , s 2 , t 2 , , s n , t n ) K
E ( s 1 , t 1 , s 2 , t 2 , , s n , t n ) ( Z ) : = X s 1 Z t 1 X s 2 Z t 2 X s n Z t n ,
E ( s 1 , t 1 , s 2 , t 2 , , s n , t n ) ( X ) : = Z s 1 X t 1 Z s 2 X t 2 Z s n X t n ,
and an index set
S ( J j , i j ) j = 1 n ( W ) = S ( J 1 , i 1 , J 2 , i 2 , , J n , i n ) ( W ) : = S ( J 1 , i 1 ) ( W ) × S ( J 2 , i 2 ) ( W ) × × S ( J n , i n ) ( W )
( W { Z , X } ) which consists of direct product of
S ( J , i ) ( Z ) : = { ( 0 , i ) , ( 1 , i ) } ( J = 0 , i { 0 , 1 } ) { ( i , 0 ) , ( i , 1 ) } ( J = 1 , i { 0 , 1 } ) ,
S ( J , i ) ( X ) : = { ( i , 0 ) , ( i , 1 ) } ( J = 0 , i { 0 , 1 } ) { ( 0 , i ) , ( 1 , i ) } ( J = 1 , i { 0 , 1 } ) .
We define the setting of the mean multi-kings’ problem. Alice prepares the composite system ( n + 1 qubits) H ˜ : = H A H K 1 H K 2 H K n ( C 2 ) n + 1 in an initial state. Each King j performs one of the measurements on H K j
M ( J j ) = ( M 0 ( J j ) , M 1 ( J j ) ) ( J j { 0 , 1 } ) ,
where M ( 0 ) : = ( M 0 ( 0 ) : = Z 0 , M 1 ( 0 ) : = Z 1 ) and M ( 1 ) : = ( M 0 ( 1 ) : = X 0 , M 1 ( 1 ) : = X 1 ) , and obtains an outcome i j { 0 , 1 } . Alice performs a measurement on H ˜ and obtains an outcome. After Alice’s measurement, the kings reveal ( J j ) j = 1 n as the post-information. Then, Alice tries to guess kings’ outcomes by using her outcome and the post-information.
Here, we show two solutions to the problem. In this case, Alice can guess the kings’ outcomes correctly by employing one of
| Φ ( Z ) : = 1 2 ( | 00 0 + | 11 1 )
| Φ ( X ) : = 1 2 ( | 0 ¯ 0 ¯ 0 ¯ + | 1 ¯ 1 ¯ 1 ¯ )
as an initial state, a measurement depending on the initial state | Φ ( W )
P ( W ) : = P k ( W ) : = 2 n + 1 | ( I E k ( W ) ) Φ ( W ) ( I E k ( W ) ) Φ ( W ) | k K
and a guessing function s ( k , ( J j ) j = 1 n , Φ ( W ) ) of her outcome k K , the post-information ( J j ) j = 1 n , and the initial state | Φ ( W ) , where s ( k , ( J j ) j = 1 n , Φ ( W ) ) is defined as ( i j ) j = 1 n satisfying k S ( J j , i j ) j = 1 n ( W ) (we regard k = ( s 1 , t 1 , s 2 , t 2 , , s n , t n ) in the same light as ( ( s 1 , t 1 ) , ( s 2 , t 2 ) , , ( s n , t n ) ) ).
We clear the number of non-zero matrices in her measurement and their orthogonality. We can observe
| ( I E k ( Z ) ) Φ ( Z ) = ( I X s 1 Z t 1 X s n Z t n ) 1 2 ( | 00 0 + | 11 1 ) = 1 2 ( δ t 1 0 δ t n 0 | 0 X s 1 | 0 X s 2 | 0 X s n | 0 + δ t 1 1 δ t n 1 | 1 X s 1 | 1 X s 2 | 1 X s n | 1 ) .
Then, the number of non-zero vectors is equal to 2 n + 1 . It leads to the conclusion that the number of non-zero matrices in P ( Z ) is equal to 2 n + 1 . Furthermore, we observe
( I E k ( Z ) ) Φ ( Z ) | ( I E k ( Z ) ) Φ ( Z ) = ( I X s 1 Z t 1 X s n Z t n ) Φ ( Z ) | ( I X s 1 Z t 1 X s n Z t n ) Φ ( Z ) = 1 2 n + 1 ( δ t 1 0 δ t 2 0 δ t n 0 + δ t 1 1 δ t 2 1 δ t n 1 ) δ k k .
It implies that P ( Z ) is an orthogonal measurement on H ˜ . When Z is switched to X, we have the same result in the case of W = X .
Next, we show that Alice can correctly guess kings’ outcomes. We observe
S ( J j , i j ) j = 1 n ( W ) S ( J j , i j ) j = 1 n ( W ) =
for any J j and ( i 1 , i 2 , , i n ) ( i 1 , i 2 , , i n ) , and
M i 1 ( J 1 ) M i 2 ( J 2 ) M i n ( J n ) = k S ( J j , i j ) j = 1 n ( W ) E k ( W )
holds for any J j and i j . When King j performs the measurement M ( J j ) and obtains an outcome i j , by Equation (15), the post-measurement state is proportional to
| ( I M i 1 ( J 1 ) M i 2 ( J 2 ) M i n ( J n ) ) Φ ( W ) k S ( J j , i j ) j = 1 n ( W ) A k ,
where A k is a subspace spanned by | ( I E k ( W ) ) Φ ( W ) . A k and A k are orthogonal for any k k and P ( W ) is composed of orthogonal projections onto each subspace A k by Equation (13). If Alice obtains an outcome k by performing P ( W ) and the post-information ( J j ) j = 1 n from the kings, then kings’ outcomes ( i j ) j = 1 n should satisfy k S ( J j , i j ) j = 1 n ( W ) . However, by Equation (14), such ( i j ) j = 1 n uniquely exists. Thus, Alice can correctly guess kings’ outcomes.
A description of the QKD protocol by using the mean multi-kings’ problem is as follows.
  • Alice prepares a composite system ( n + 1 qubits) H ˜ = H A H K 1 H K 2 H K n ( C 2 ) n + 1 in the initial state | Φ ( W ) ( W { Z , X } ) with probability 1 2 . Then, she sends the qubit H K j to King j ( j = 1 , 2 , , n ).
  • Each King j performs the measurement M ( J j ) = ( M 0 ( J j ) , M 1 ( J j ) ) ( J j { 0 , 1 } ) with probability 1 2 on H K j and obtains an outcome i j { 0 , 1 } . After the measurement, each King j returns H K j to Alice.
  • Alice performs the measurement P ( W ) = ( P k ( W ) ) k K ( W { Z , X } ) on H ˜ when the initial state was | Φ ( W ) . Then, she obtains an outcome k K .
  • After the measurement, each King j announces post-information J j to Alice.
  • Alice obtains a sequence s ( k , ( J j ) j = 1 n , Φ ( W ) ) from the outcome k, the post-information ( J j ) j = 1 n , and the initial state | Φ ( W ) .
  • They repeat the above process. After that, Alice randomly chooses sequences ( i j 1 ) j = 1 n , ( i j 2 ) j = 1 n , , ( i j r ) j = 1 n from all sequences. Similarly, kings work together to choose sequences ( i j 1 ) j = 1 n , ( i j 2 ) j = 1 n , , ( i j r ) j = 1 n which are the same positions as the positions Alice chose. Then, Alice and kings work together to calculate error rate u = 1 r ( 1 δ ( i j u ) j = 1 n ( i j u ) j = 1 n ) r .
The rest of the process is the same as for ordinary QKD protocols, such as BB84 protocol. If the error rate is too large, the protocol is aborted. Otherwise, the leftover sequences are performed with error-correction and privacy amplification [20].
Remark that Alice and each King j can share the secret key when they employ the QKD protocol using the mean-king’s problem or BB84 protocol. In the case of employing the QKD using the mean-king’s problem (see left hand side of Figure 2), Alice prepares 2 qubits in the Bell state and performs a single measurement on the 2 qubits for each King j . Therefore, she needs to prepare 2 n qubits and perform n measurements to share the secret key with n kings. On the other hand, in the QKD protocol using the mean multi-kings’ problem, Alice only prepares n + 1 qubits in | Φ ( Z ) or | Φ ( X ) and performs the single measurement P ( Z ) or P ( X ) . In the case where the BB84 protocol is employed (see right hand side of Figure 2), Alice just prepares n qubits in one of the states | 0 , | 1 , | 0 ¯ , | 1 ¯ and no performing the measurement is required. Then, Alice and King j discard the raw key where their bases do not match before calculating error rate. On the other hand, in the QKD protocol using the mean multi-kings’ problem, there is not such discarding step before calculating error rate.

3. Protocol: n = 2

We describe the working of the protocol in the case of n = 2 by focusing on the case of W = Z to reduce cumbersome notations.
By Equation (2), the index set takes the following form,
K = { ( s 1 , t 1 , s 2 , t 2 ) s j , t j { 0 , 1 } } .
And by Equation (3), the operator E k ( Z ) for k K takes the following form,
E k ( Z ) = E ( s 1 , t 1 , s 2 , t 2 ) ( Z ) = X s 1 Z t 1 X s 2 Z t 2 ( k = ( s 1 , t 1 , s 2 , t 2 ) K ) .
Similarly, we can observe the operators for W = X . By Equation (5), we observe the index sets S ( J 1 , i 1 , J 2 , i 2 ) ( W ) for J 1 = 0 , J 2 = 0 , i 1 , i 2 { 0 , 1 } , and W = Z :
S ( 0 , 0 , 0 , 0 ) ( Z ) = S ( 0 , 0 ) ( Z ) × S ( 0 , 0 ) ( Z ) = { ( ( 0 , 0 ) , ( 0 , 0 ) ) , ( ( 0 , 0 ) , ( 1 , 0 ) ) , ( ( 1 , 0 ) , ( 0 , 0 ) ) , ( ( 1 , 0 ) , ( 1 , 0 ) ) } = { ( 0 , 0 , 0 , 0 ) , ( 0 , 0 , 1 , 0 ) , ( 1 , 0 , 0 , 0 ) , ( 1 , 0 , 1 , 0 ) }
S ( 0 , 0 , 0 , 1 ) ( Z ) = S ( 0 , 0 ) ( Z ) × S ( 0 , 1 ) ( Z ) = { ( ( 0 , 0 ) , ( 0 , 1 ) ) , ( ( 0 , 0 ) , ( 1 , 1 ) ) , ( ( 1 , 0 ) , ( 0 , 1 ) ) , ( ( 1 , 0 ) , ( 1 , 1 ) ) } = { ( 0 , 0 , 0 , 1 ) , ( 0 , 0 , 1 , 1 ) , ( 1 , 0 , 0 , 1 ) , ( 1 , 0 , 1 , 1 ) }
S ( 0 , 1 , 0 , 0 ) ( Z ) = S ( 0 , 1 ) ( Z ) × S ( 0 , 0 ) ( Z ) = { ( ( 0 , 1 ) , ( 0 , 0 ) ) , ( ( 0 , 1 ) , ( 1 , 0 ) ) , ( ( 1 , 1 ) , ( 0 , 0 ) ) , ( ( 1 , 1 ) , ( 1 , 0 ) ) } = { ( 0 , 1 , 0 , 0 ) , ( 0 , 1 , 1 , 0 ) , ( 1 , 1 , 0 , 0 ) , ( 1 , 1 , 1 , 0 ) }
S ( 0 , 1 , 0 , 1 ) ( Z ) = S ( 0 , 1 ) ( Z ) × S ( 0 , 1 ) ( Z ) = { ( ( 0 , 1 ) , ( 0 , 1 ) ) , ( ( 0 , 1 ) , ( 1 , 1 ) ) , ( ( 1 , 1 ) , ( 0 , 1 ) ) , ( ( 1 , 1 ) , ( 1 , 1 ) ) } = { ( 0 , 1 , 0 , 1 ) , ( 0 , 1 , 1 , 0 ) , ( 1 , 1 , 0 , 1 ) , ( 1 , 1 , 1 , 1 ) } ,
where we regard ( ( l 1 , l 2 ) , ( l 3 , l 4 ) ) in the same light as ( l 1 , l 2 , l 3 , l 4 ) . Similarly, we can observe the index sets for other J 1 , J 2 , i 1 , i 2 , and W.
Let us consider that Alice prepares the qubits H ˜ = H A H K 1 H K 2 in the initial state
| Φ ( Z ) = 1 2 ( | 000 + | 111 ) .
Let us consider that King 1 and King 2 choose the same measurement M ( 0 ) and obtain the same outcome 0, i.e., J 1 = 0 , J 2 = 0 and i 1 = 0 , i 2 = 0 . After kings’ measurement, Alice performs the measurement P ( Z ) = ( P k ( Z ) ) k K on H ˜ , where
P k ( Z ) = 8 | ( I E k ( Z ) ) Φ ( Z ) ( I E k ( Z ) ) Φ ( Z ) | r = 8 | ( I X s 1 Z t 1 X s 2 Z t 2 ) Φ ( Z ) ( I X s 1 Z t 1 X s 2 Z t 2 ) Φ ( Z ) | .
After the measurement, King 1 and King 2 announce the post-information J 1 = 0 and J 2 = 0 to Alice. When Alice obtains an outcome k = ( 0 , 0 , 0 , 0 ) , she is assured that kings’ outcome ( i 1 , i 2 ) is ( 0 , 0 ) , because ( i 1 , i 2 ) satisfying k = ( 0 , 0 , 0 , 0 ) S ( J 1 , i 1 , J 2 , i 2 ) ( W ) = S ( 0 , i 1 , 0 , i 2 ) ( Z ) is ( 0 , 0 ) . In Table 1, we summarize Alice’s guessing rule by using her outcome and the post-information from the kings.
In the case of n = 2 , the following simple attack so called intercept-resend attack can be considered. An eavesdropper (called Eve) intercepts H K j returned to Alice from King j (step 2 in the protocol) and performs the measurement M ( 0 ) or M ( 1 ) probabilistically on H K j . After the measurement, she resends H K j to Alice. When Eve performs the intercept-resend attack to only H K 1 , the probability which the error occurs is 1 8 , where the error means the event: δ ( i j u ) j = 1 2 ( i j u ) j = 1 2 = 0 . When Eve performs the intercept-resend attack to both H K 1 and H K 2 , the probability which the error occurs is 1 32 ( p 1 + p 2 2 p 1 p 2 + 7 ) , where p j denotes the probability, which Eve performs the measurement M ( 0 ) on H K j ( j { 1 , 2 } ). The minimum value of the probability is 0.21875 when ( p 1 = 1 , p 2 = 1 ) or ( p 1 = 0 , p 2 = 0 ) and the maximum value of the probability is 0.25 when ( p 1 = 1 , p 2 = 0 ) or ( p 1 = 0 , p 2 = 1 ) .

4. Distinguishability vs. Disturbance

In this section, let us consider two types of the attacks and let us see whether Eve can extract information by employing the attacks without disturbing contained in legitimate users’ information in the case of n = 2 . First, Eve tries to gain information from the qubit returned to Alice by King 1 (step 2 in the protocol) by interacting the qubit H K 1 with her quantum system H E (see Figure 3). Second, she tries to gain information from the qubits H K j returned to Alice by King j (step 2 in the protocol) by interacting H K 1 H K 2 with her quantum system H E (see Figure 4). In both of the attacks, Eve performs any measurement on her quantum system H E at any time.
We can consider an attack that Eve interacts her quantum system with the qubits sent to the kings by Alice. However, in this attack, the qubits are not encoded because the kings have not measured the qubits. Especially, in the case of n = 1 , the setting of the attack can be considered as monogamy of entanglement [21,22]. Moreover, we can also consider an attack that Eve interacts her quantum system with both of the qubits sent to the kings by Alice and the qubits returned to Alice by the kings. However, the setting of the attack is different from one for discussing the information disturbance theorem. In the setting for the theorem, Eve tries to information extract from only the encoded qubits. Therefore, we concentrate on the above two attacks that Eve tries to extract information from the qubits sent to Alice by the kings.
In the beginning, we define error probability which represents probability that Alice cannot guess king’s outcomes correctly by using her outcome and the post-information. Remark that the error probability is different from the error rate (step 6 in the protocol). Let P ( W ) ( k J 1 ; i 1 , J 2 ; i 2 ) be the probability that Alice obtains an outcome k when she chooses | Φ ( W ) and King j obtains an outcome i j with the measurement M ( J j ) ( j { 1 , 2 } ). We define
P suc ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) : = k S ( J j , i j ) j = 1 2 ( W ) P ( W ) ( k J 1 ; i 1 , J 2 ; i 2 )
and
P suc ( J 1 ; i 1 , J 2 ; i 2 ) : = 1 2 W { X , Z } P suc ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) .
Then, we define the error probability when King j obtains an outcome i j with the measurement M ( J j ) :
P err ( J 1 ; i 1 , J 2 ; i 2 ) : = 1 P suc ( J 1 ; i 1 , J 2 ; i 2 ) .
Equation (27) represents probability that Alice’s sequence and kings’ sequence do not match when King j obtains an outcome i j with the measurement M ( J j ) , i.e., Alice cannot guess kings’ outcomes correctly by using her outcome and the post-information.
Let us consider that Eve tries to extract information from H K 1 . Eve prepares her own quantum system H E in a quantum state Ω . She intercepts H K 1 in the state ρ ( K 1 ) returned to Alice by King 1 and interacts it with H E . Let us denote the interaction by
T * ( ρ ( K 1 ) ) : = U ρ ( K 1 ) Ω U ,
where U is a unitary operator on H K 1 H E . Moreover, we denote the local state of H E (resp. H K 1 ) by partial trace over the H K 1 (resp. H E )
T E * ( ρ ( K 1 ) ) : = tr H K 1 T * ( ρ ( K 1 ) ) resp . T K 1 * ( ρ ( K 1 ) ) : = tr H K E T * ( ρ ( K 1 ) ) .
Let us consider that King 1 obtains an outcome i with a measurement M ( 1 ) . Then, the state of H K 1 before the interaction is ρ ( K 1 ) = | i ¯ i ¯ | . Eve tries to extract information regarding to the secret key by distinguishing T E * ( | 0 ¯ 0 ¯ | ) and T E * ( | 1 ¯ 1 ¯ | ) .
We employ trace distance as a measure for distinguishability of the states. Trace norm between a state ρ and a state σ is defined as | | ρ σ | | 1 : = sup | | A | | = 1 | tr ( ρ σ ) A | , where | | · | | denotes operator norm. Trace distance is defined as follows,
D ( ρ , σ ) : = 1 2 | | ρ σ | | 1 .
It takes a value from 0 to 1. In addition, D ( ρ , σ ) = 0 if and only if ρ = σ , and D ( ρ , σ ) = 0 if and only if tr ( ρ σ ) = 0 . Let us remind the definition of fidelity [23,24]. Fidelity between ρ and σ is defined as F ( ρ , σ ) : = tr ρ 1 / 2 σ ρ 1 / 2 . The following alternative expression of fidelity [25,26] has been shown,
F ( ρ , σ ) = inf ( M a ) a : POVM a p ( a ρ ) p ( a σ ) ,
where p ( a ρ ) and p ( a σ ) are defined as p ( a ρ ) : = tr ( M a ρ ) and p ( a σ ) : = tr ( M a σ ) .
Lemma 1.
The following relation between trace distance and fidelity holds,
1 2 | | T E * ( | 0 ¯ 0 ¯ | ) T E * ( | 1 ¯ 1 ¯ | ) | | 1 F ( T K 1 * ( | 0 0 | ) , T K 1 * ( | 1 1 | ) ) .
Proof of Lemma 1.
From Lemma 3 in [27], we have
| 0 | T ( I A ) | 1 | | | A | | F ( T K 1 * ( | 0 0 | ) , T K 1 * ( | 1 1 | ) )
for any operator A on H E , where T is defined as tr T * ( ρ ) X = tr ρ T ( X ) . By using Equation (33), we observe
| tr T E * ( | 0 ¯ 0 ¯ | T E * 1 2 I A | = | tr | 0 ¯ 0 ¯ | 1 2 I T ( I A ) | = | tr 1 2 ( | 0 1 | + | 1 0 | ) T ( I A ) | 1 2 { | 1 | T ( I A ) | 0 | + | 0 | T ( I A ) | 1 | } | | A | | F ( T K 1 * ( | 0 0 | ) , T K 1 * ( | 1 1 | ) ) .
Then,
1 2 | | T E * ( | 0 ¯ 0 ¯ | ) T E * ( | 1 ¯ 1 ¯ | ) | | 1 = | | T E * ( | 0 ¯ 0 ¯ | ) T E * 1 2 I | | 1 = sup | | A | | = 1 | tr ( T E * ( | 0 ¯ 0 ¯ | ) T E * 1 2 I A | F ( T K 1 * ( | 0 0 | ) , T K 1 * ( | 1 1 | ) )
holds. □
Theorem 1.
The following trade-off inequality holds,
D ( T E * ( | 0 ¯ 0 ¯ | ) , T E * ( | 1 ¯ 1 ¯ | ) ) 2 P err ( 0 ; 0 , 0 ; 0 ) + 2 P err ( 0 ; 1 , 0 ; 1 ) .
The left hand side of the inequality represents distinguishability for Eve, and the right hand side is the sum of the error probabilities which represent probability that Alice’s sequence and kings’ sequence are not equal when the kings obtain the corresponding outcomes with the corresponding measurements, i.e., Alice cannot guess kings’ sequence correctly by using her outcome and the post-information. This theorem shows that Eve’s extracting information regarding King 1 ’s key related with the measurement M ( 1 ) inevitably induces disturbing the states and increases the error probability when both of kings choose the measurement M ( 0 ) . This implies that the more Eve extracts information, the more possibility for Alice and the kings to detect the existence of the attack increases. In particular, Eve cannot extract information about the key at all (i.e., trace distance is zero) when the corresponding error probabilities are zero. Remark that similar inequalities between distinguishability of other pairs of states and the error probabilities can be proven in the similar way as below.
Proof of Theorem 1.
Before obtaining the inequalities, let us observe the error probability. Define ρ i : = T K 1 * ( | i i | ) . By direct calculations (see Appendix A for details), we have the following probability,
P err ( 0 ; i , 0 ; i ) = 1 2 ( 1 i | ρ i i ) .
By using Equations (31) and (37), we have
F ( ρ 0 , ρ 1 ) = inf ( M a ) a : POVM a tr ( M a ρ 0 ) tr ( M a ρ 1 ) tr ( | 0 0 | ρ 0 ) tr ( | 0 0 | ρ 1 ) + tr ( | 1 1 | ρ 0 ) tr ( | 1 1 | ρ 1 ) = 0 | ρ 0 0 ( 1 1 | ρ 1 1 ) + ( 1 0 | ρ 0 0 ) 1 | ρ 1 1 1 1 | ρ 1 1 + 1 0 | ρ 0 0 = 2 P err ( 0 ; 0 , 0 ; 0 ) + 2 P err ( 0 ; 1 , 0 ; 1 ) ,
where we employ ( | 0 0 | , | 1 1 | ) as a POVM in the first inequality. Then, we have the trade-off inequality by the definition of trace distance, Equations (32) and (38). □
Let us consider that Eve tries to extract information from H K 1 and H K 2 . Eve prepares a quantum systems H E in a quantum state Ω . She intercepts H K 1 H K 2 in the state ρ ( K 1 , K 2 ) returned to Alice by King 1 and King 2 . Then, she interacts both systems with H E . Let us denote the interaction by
K * ( ρ ( K 1 , K 2 ) ) : = V ρ ( K 1 , K 2 ) Ω V ,
where V is a unitary operator on H K 1 H K 2 H E . And we denote the local state of H E (resp. H K 1 H K 2 ) by partial trace over the H K 1 H K 2 (resp. H E )
K E * ( ρ ( K 1 , K 2 ) ) : = tr H K 1 H K 2 K * ( ρ ( K 1 , K 2 ) ) resp . K K 1 , K 2 * ( ρ ( K 1 K 2 ) ) : = tr H K E K * ( ρ ( K 1 , K 2 ) ) .
Let us consider that King 1 and King 2 perform the same measurement M ( 1 ) and obtain the same outcome i. Then, the state of H K 1 H K 2 before the interaction is | i ¯ i ¯ i ¯ i ¯ | . Eve tries to extract information regarding to the secret key by distinguishing K E * ( | 0 ¯ 0 ¯ 0 ¯ 0 ¯ | ) and K E * ( | 1 ¯ 1 ¯ 1 ¯ 1 ¯ | ) .
Lemma 2.
The following relation between trace distance and fidelity holds,
| | K E * ( | 0 ¯ 0 ¯ 0 ¯ 0 ¯ | ) K E * ( | 1 ¯ 1 ¯ 1 ¯ 1 ¯ | ) | | 1 i { 0 , 1 } F ( K K 1 K 2 * ( | i i i i | ) , K K 1 K 2 * ( | 01 01 | ) + i { 0 , 1 } F ( K K 1 K 2 * ( | i i i i | ) , K K 1 K 2 * ( | 10 10 | ) .
Proof of Lemma 2.
From Lemma 3 in [27], we have
| i 1 i 2 | K ( I A ) | i 1 i 2 | | | A | | F ( K K 1 K 2 * ( | i 1 i 2 i 1 i 2 | ) , K K 1 K 2 * ( | i 1 i 2 i 1 i 2 | ) )
for any operator A on H E , where K is defined as tr K * ( ρ ) X = tr ρ K ( X ) . By using Equation (42), we observe
| tr [ { K E * ( | 0 ¯ 0 ¯ 0 ¯ 0 ¯ | ) K E * ( | 1 ¯ 1 ¯ 1 ¯ 1 ¯ | ) } A ] | = | tr { ( | 0 ¯ 0 ¯ 0 ¯ 0 ¯ | | 1 ¯ 1 ¯ 1 ¯ 1 ¯ | ) K ( I A ) } | = | tr { 1 2 ( | 00 01 | + | 00 10 | + | 01 00 | + | 01 11 | + | 10 00 | + | 10 11 | + | 11 01 | + | 11 10 | ) K ( I A ) } | i { 0 , 1 } | i i | K ( I A ) | 01 | + i { 0 , 1 } | i i | K ( I A ) | 10 | | | A | | { i { 0 , 1 } F ( K K 1 K 2 * ( | i i i i | ) , K K 1 K 2 * ( | 01 01 | ) + i { 0 , 1 } F ( K K 1 K 2 * ( | i i i i | ) , K K 1 K 2 * ( | 10 10 | ) } .
In Equation (43), we take supreme over all A such that | | A | | = 1 , then we have Equation (41). □
Theorem 2.
The following trade-off inequality holds,
D ( K E * ( | 0 ¯ 0 ¯ 0 ¯ 0 ¯ | ) , K E * ( | 1 ¯ 1 ¯ 1 ¯ 1 ¯ | ) ) < i 1 , i 2 { 0 , 1 } 2 P err ( 0 ; i 1 , 0 ; i 2 ) .
Although Eve tries to distinguish the states on H K 1 H K 2 , this theorem gives the same claim as the one of Theorem 1. This theorem shows that Eve’s extracting information regarding kings’ keys related with the measurement M ( 1 ) inevitably induces disturbing the states and increases the error probability when both of kings choose the measurement M ( 0 ) . Remark that similar inequalities between distinguishability of other pairs of states and the error probabilities can be proven in the similar way as below.
Proof of Theorem 2.
In the same manner, let us observe the error probability. Define ρ i 1 i 2 : = K K 1 K 2 * ( | i 1 i 2 i 1 i 2 | ) . By direct calculations (see Appendix B for details), we have the following probability,
P err ( 0 ; i 1 , 0 ; i 2 ) = 1 2 ( 1 i 1 i 2 | ρ i 1 i 2 | i 1 i 2 ) ( i 1 = i 2 ) 1 1 2 i 1 i 2 | ρ i 1 i 2 | i 1 i 2 ( i 1 i 2 ) .
By using Equations (31) and (45), we have
F ( ρ 00 , ρ 01 ) = inf ( M a ) a : POVM a tr ( M a ρ 00 ) tr ( M a ρ 01 ) tr { ( | 11 11 | + | 01 01 | ) ρ 00 } tr { ( | 00 00 | + | 01 01 | ) ρ 01 } + tr { ( | 00 00 | + | 10 10 | ) ρ 00 } tr { ( | 00 00 | + | 10 10 | ) ρ 01 } < tr { ( | 11 11 | + | 01 01 | ) ρ 00 } + tr { ( | 00 00 | + | 10 10 | ) ρ 01 } = 1 00 | ρ 00 | 00 10 | ρ 00 | 10 + 1 01 | ρ 01 | 01 11 | ρ 01 | 11 < 1 00 | ρ 00 | 00 + 2 01 | ρ 01 | 01 = 2 P err ( 0 ; 0 , 0 ; 0 ) + 2 P err ( 0 ; 0 , 0 ; 1 ) .
where we employ ( | 11 11 | + | 01 01 | , | 00 00 | + | 10 10 | ) as a POVM in the first inequality. In the same manner, we have
F ( ρ i i , ρ 01 ) < 2 P err ( 0 ; i , 0 ; i ) + 2 P err ( 0 ; 0 , 0 ; 1 ) ,
F ( ρ i i , ρ 10 ) < 2 P err ( 0 ; i , 0 ; i ) + 2 P err ( 0 ; 1 , 0 ; 0 ) ( i { 0 , 1 } ) .
Then, we have the trade-off inequality by the definition of trace distance, Equations (41) and (48). □

5. Summary

In this paper, we discussed the quantum key distribution protocol using the mean multi-kings’ problem. By using the protocol, Alice can share the secret key with King j ( j = 1 , 2 , , n ). In the case of n = 2 , we considered whether Eve can extract information when she can performs the interaction between her own quantum system and the qubit returned by King j and can performs any measurement on her quantum system at any time. We employed trace distance as a measure for distinguishability of the states for Eve. Furthermore, we gave the trade-off inequalities between trace distance of the quantum states corresponding to the secret key for Eve and the error probability which represents probability that the bit sequences shared by the legitimate users do not match. In BB84, such relation is know as the information disturbance theorem and the theorem is also regarded as an information theoretical version of the uncertainty relation. Our inequalities showed that Eve’s extracting information regarding kings’ keys inevitably induces disturbing the states and increases the error probability even though Alice can use the post-information to guess kings’ outcomes. This implies that the information gain by Eve increases possibility for the legitimate users to detect the existence of the attacks. In particular, when the corresponding error probability is zero, Eve cannot extract any information.

Author Contributions

Conceptualization, M.Y.; investigation, A.N. and J.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

We provide a direct calculation for obtaining the error probabilities in the proof of Theorem 1. Let us consider that the initial state is | Φ ( W ) , King j ( j { 1 , 2 } ) obtains an outcome i j with M ( J j ) , and Eve performs the interaction on H K 1 H E . Let ρ ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) be a state of the composite system before Alice’s measurement. The state takes one of the following forms,
ρ ( 0 ; i 1 , 0 ; i 1 ) ( Z ) = | i 1 i 1 | ρ i 1 | i 1 i 1 | ,
ρ ( 0 ; i 1 , 1 ; i 2 ) ( Z ) = | i 1 i 1 | ρ i 1 | i ¯ 2 i ¯ 2 | ,
ρ ( 1 ; i 1 , 0 ; i 2 ) ( Z ) = | i 2 i 2 | ρ i ¯ 1 | i 2 i 2 | ,
ρ ( 1 ; i 1 , 1 ; i 2 ) ( Z ) = | i ¯ 1 i ¯ 1 | ρ i ¯ 1 | i ¯ 2 i ¯ 2 | ,
ρ ( 0 ; i 1 , 0 ; i 2 ) ( X ) = | i 1 i 2 i 1 i 2 | ρ i 1 | i 2 i 2 | ,
ρ ( 0 ; i 1 , 1 ; i 2 ) ( X ) = | i ¯ 2 i ¯ 2 | ρ i 1 | i ¯ 2 i ¯ 2 | ,
ρ ( 1 ; i 1 , 0 ; i 2 ) ( X ) = | i ¯ 1 i ¯ 1 | ρ i ¯ 1 | i 2 i 2 | ,
ρ ( 1 ; i 1 , 1 ; i 1 ) ( X ) = | i ¯ 1 i ¯ 1 | ρ i ¯ 1 | i ¯ 1 i ¯ 1 | ,
where ρ i : = T K 1 * ( | i i | ) , ρ i ¯ : = T K 1 * ( | i ¯ i ¯ | ) , and ⊕ denotes exclusive or.
By direct calculation of
P suc ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) = k S ( J j , i j ) j = 1 2 ( W ) tr P k ( W ) ρ ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) ,
we have the following probabilities,
P suc ( 0 ; i 1 , 0 ; i 1 ) ( Z ) = P suc ( 0 ; i 1 , 1 ; i 2 ) ( Z ) = 1 ,
P suc ( 1 ; i 1 , 0 ; i 2 ) ( Z ) = P suc ( 1 ; i 1 , 1 ; i 2 ) ( Z ) = i ¯ 1 | ρ i ¯ 1 i ¯ 1 ,
P suc ( 0 ; i 1 , 0 ; i 2 ) ( X ) = P suc ( 0 ; i 1 , 1 ; i 2 ) ( X ) = i 1 | ρ i 1 i 1 ,
P suc ( 1 ; i 1 , 0 ; i 2 ) ( X ) = P suc ( 1 ; i 1 , 1 ; i 1 ) ( X ) = 1 ,
where we can find out the index set S ( J j , i j ) j = 1 2 ( W ) in Table 1. By the definition of P suc ( J 1 ; i 1 , J 2 ; i 2 ) , we have the following probabilities,
P suc ( 0 ; i 1 , 0 ; i 2 ) = 1 2 ( i 1 | ρ i 1 i 1 + 1 ) ( i 1 = i 2 ) 1 2 i 1 | ρ i 1 i 1 ( i 1 i 2 ) ,
P suc ( 0 ; i 1 , 1 ; i 2 ) = 1 2 i 1 | ρ i 1 i 1 ,
P suc ( 1 ; i 1 , 0 ; i 2 ) = 1 2 i ¯ 1 | ρ i ¯ 1 i ¯ 1 ,
P suc ( 1 ; i 1 , 1 ; i 2 ) = 1 2 ( i ¯ 1 | ρ i ¯ 1 i ¯ 1 + 1 ) ( i 1 = i 2 ) 1 2 i ¯ 1 | ρ i ¯ 1 i ¯ 1 ( i 1 i 2 ) .
Then, we can observe the error probabilities from these probabilities.

Appendix B

We provide a direct calculation for obtaining the error probabilities in the proof of Theorem 2. Let us consider that the initial state is | Φ ( W ) , King j ( j { 1 , 2 } ) obtains an outcome i j with M ( J j ) , and Eve performs the interaction on H K 1 H K 2 H E j . Let ρ ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) be a state of the composite system before Alice’s measurement. The state takes one of the following forms,
ρ ( 0 ; i 1 , 0 ; i 1 ) ( Z ) = | i 1 i 1 | ρ i 1 i 1 ,
ρ ( 0 ; i 1 , 1 ; i 2 ) ( Z ) = | i 1 i 1 | ρ i 1 i ¯ 2 ,
ρ ( 1 ; i 1 , 0 ; i 2 ) ( Z ) = | i 2 i 2 | ρ i ¯ 1 i 2 ,
ρ ( 1 ; i 1 , 1 ; i 2 ) ( Z ) = | i ¯ 1 i ¯ 1 | ρ i ¯ 1 i ¯ 2 ,
ρ ( 0 ; i 1 , 0 ; i 2 ) ( X ) = | i 1 i 2 i 1 i 2 | ρ i 1 i 2 ,
ρ ( 0 ; i 1 , 1 ; i 2 ) ( X ) = | i ¯ 2 i ¯ 2 | ρ i ¯ 1 i 2 ,
ρ ( 1 ; i 1 , 0 ; i 2 ) ( X ) = | i ¯ 1 i ¯ 1 | ρ i ¯ 1 i 2 ,
ρ ( 1 ; i 1 , 1 ; i 1 ) ( X ) = | i ¯ 1 i ¯ 1 | ρ i ¯ 1 i ¯ 1 ,
where ρ i j : = K K 1 K 2 * ( | i j i j | ) ( i , j { 0 , 1 , 0 ¯ , 1 ¯ } ).
By direct calculation of
P suc ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) = k S ( J j , i j ) j = 1 2 ( W ) tr P k ( W ) ρ ( J 1 ; i 1 , J 2 ; i 2 ) ( W ) ,
we have the following probabilities,
P suc ( 0 ; i 1 , 0 ; i 1 ) ( Z ) = 1 ,
P suc ( 0 ; i 1 , 1 ; i 2 ) ( Z ) = i ¯ 1 i ¯ 2 | ρ i 1 i ¯ 2 | i ¯ 1 i ¯ 2 + i 1 1 ¯ i ¯ 2 | ρ i 1 i ¯ 2 | i 1 1 ¯ i ¯ 2 ,
P suc ( 1 ; i 1 , 0 ; i 2 ) ( Z ) = i ¯ 1 i ¯ 2 | ρ i ¯ 1 i 2 | i ¯ 1 i ¯ 2 + i ¯ 1 i 2 1 ¯ | ρ i ¯ 1 i 2 | i ¯ 1 i 2 1 ¯ ,
P suc ( 1 ; i 1 , 1 ; i 2 ) ( Z ) = i ¯ 1 i ¯ 2 | ρ i ¯ 1 i ¯ 2 | i ¯ 1 i ¯ 2 ,
P suc ( 0 ; i 1 , 0 ; i 2 ) ( X ) = i 1 i 2 | ρ i 1 i 2 | i 1 i 2 ,
P suc ( 0 ; i 1 , 1 ; i 2 ) ( X ) = i 1 i 2 | ρ i 1 i ¯ 2 | i 1 i 2 + i 1 i 2 1 | ρ i 1 i ¯ 2 | i 1 i 2 1 ,
P suc ( 1 ; i 1 , 0 ; i 2 ) ( X ) = i 1 i 2 | ρ i ¯ 1 i 2 | i 1 i 2 + i 1 1 i 2 | ρ i ¯ 1 i 2 | i 1 1 i 2 ,
P suc ( 1 ; i 1 , 1 ; i 1 ) ( X ) = 1 .
By the definition of P suc ( J 1 ; i 1 , J 2 ; i 2 ) , we have the following probabilities,
P suc ( 0 ; i 1 , 0 ; i 2 ) = 1 2 ( i 1 i 2 | ρ i 1 i 2 | i 1 i 2 + 1 ) ( i 1 = i 2 ) 1 2 i 1 i 2 | ρ i 1 i 2 | i 1 i 2 ( i 1 i 2 ) ,
P suc ( 0 ; i 1 , 1 ; i 2 ) = 1 2 ( i ¯ 1 i ¯ 2 | ρ i 1 i ¯ 2 | i ¯ 1 i ¯ 2 + i 1 1 ¯ i ¯ 2 | ρ i 1 i ¯ 2 | i 1 1 ¯ i ¯ 2 + i 1 i 2 | ρ i 1 i ¯ 2 | i 1 i 2 + i 1 i 2 1 | ρ i 1 i ¯ 2 | i 1 i 2 1 ) ,
P suc ( 1 ; i 1 , 0 ; i 2 ) = 1 2 ( i ¯ 1 i ¯ 2 | ρ i ¯ 1 i 2 | i ¯ 1 i ¯ 2 + i ¯ 1 i 2 1 ¯ | ρ i ¯ 1 i 2 | i ¯ 1 i 2 1 ¯ + i 1 i 2 | ρ i ¯ 1 i 2 | i 1 i 2 + i 1 1 i 2 | ρ i ¯ 1 i 2 | i 1 1 i 2 ) ,
P suc ( 1 ; i 1 , 1 ; i 2 ) = 1 2 ( i ¯ 1 i ¯ 2 | ρ i ¯ 1 i ¯ 2 | i ¯ 1 i ¯ 2 + 1 ) ( i 1 = i 2 ) 1 2 i ¯ 1 i ¯ 2 | ρ i ¯ 1 i ¯ 2 | i ¯ 1 i ¯ 2 ( i 1 i 2 ) .
Then, we can observe the error probabilities from those probabilities.

References

  1. Chefles, A. Quantum state discrimination. Contemp. Phys. 2000, 41, 401–424. [Google Scholar] [CrossRef] [Green Version]
  2. Bergou, J.A.; Herzog, U.; Hillery, M. Quantum State Estimation, 11 Discrimination of Quantum States; Lecture Notes in Physics; Springer: Berlin/Heidelberg, Germany, 2007; Volume 649. [Google Scholar]
  3. Qiu, D.; Li, L. Relation between minimum-error discrimination and optimum unambiguous discrimination. Phys. Rev. A 2010, 82, 032333. [Google Scholar] [CrossRef]
  4. Wilde, M. Quantum Information Theory; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
  5. Vaidman, L.; Aharonov, Y.; Albert, D.Z. How to ascertain the values of σx, σy, and σz of a spin-1/2 particle. Phys. Rev. Lett. 1987, 58, 1385–1387. [Google Scholar] [CrossRef] [PubMed]
  6. Englert, B.-G.; Aharonov, Y. The mean-kings’ problem: Prime degrees of freedom. Phys. Lett. A 2001, 284, 1–5. [Google Scholar] [CrossRef] [Green Version]
  7. Aharonov, Y.; Bergmann, P.G.; Lebowitz, J.L. Time Symmetry in the Quantum Process of Measurement. Phys. Rev. 1964, 134, B1410. [Google Scholar] [CrossRef]
  8. Bub, J. Secure key distribution via pre- and postselected quantum states. Phys. Rev. A 2001, 63, 032309. [Google Scholar] [CrossRef] [Green Version]
  9. Werner, A.H.; Franz, T.; Werner, R.F. Quantum Cryptography as a Retrodiction Problem. Phys. Rev. Lett. 2009, 103, 220504. [Google Scholar] [CrossRef] [PubMed]
  10. Yoshida, M.; Miyadera, T.; Imai, H. Quantum Key Distribution using Mean King Problem with Modified Measurement Schemes. In Proceedings of the International Symposium on Information Theory and Its Applications 2012, Honolulu, HI, USA, 28–31 October 2012; pp. 317–321. [Google Scholar]
  11. Azuma, H.; Ban, M. The intercept/resend attack and the collective attack on the quantum key distribution protocol based on the pre- and post-selection effect. arXiv 2018, arXiv:quant-ph/1811.07282. [Google Scholar]
  12. Nakayama, A.; Yoshida, M.; Cheng, J. Quantum Key Distribution using Extended Mean King’s Problem. In Proceedings of the International Symposium on Information Theory and Its Applications 2018, Singapore, 28–31 October 2018; pp. 339–343. [Google Scholar]
  13. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution And Coin Tossing. In Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  14. Fuchs, C.A.; Jacobs, K. Information-tradeoff relations for finite-strength quantum measurements. Phys. Rev. A 2001, 63, 062305. [Google Scholar] [CrossRef] [Green Version]
  15. Boykin, P.O.; Roychowdhury, V.P. Information vs. Disturbance in Dimension D. Quantum Inf. Comput. 2005, 5, 396–412. [Google Scholar]
  16. Miyadera, T.; Imai, H. Information-disturbance theorem for mutually unbiased observables. Phys. Rev. A 2006, 73, 042317. [Google Scholar] [CrossRef] [Green Version]
  17. Miyadera, T.; Imai, H. Information-Disturbance theorem and Uncertainty Relation. arXiv 2007, arXiv:quant-ph/0707.4559. [Google Scholar]
  18. Busch, P. No Information Without Disturbance: Quantum Limitations of Measurement; Springer: Berlin/Heidelberg, Germany, 2009; pp. 229–256. [Google Scholar]
  19. Biham, E.; Boyer, M.; Boykin, P.O.; Mor, T.; Roychowdhury, V. A proof of security of quantum key distribution. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, Portland, OR, USA, 21–23 May 2000; pp. 715–724. [Google Scholar]
  20. Bennett, C.H.; Brassard, G.; Crépeau, C.; Maurer, U.M. Generalized Privacy Amplification. IEEE Trans. Inf. Theory 1995, 41, 1915–1923. [Google Scholar] [CrossRef] [Green Version]
  21. Deutsch, D.; Ekert, A.; Jozsa, R.; Macchiavello, C.; Popescu, S.; Sanpera, A. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. Phys. Rev. Lett. 1996, 77, 2818–2821. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Lo, H.-K.; Chau, H.F. Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances. Science 1999, 283, 2050–2056. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Uhlmann, A. The “transition probability” in the state space of a *-algebra. Rep. Math. Phys. 1976, 9, 273–279. [Google Scholar] [CrossRef]
  24. Jozsa, R. Fidelity for Mixed Quantum States. J. Mod. Opt. 1994, 41, 2315–2323. [Google Scholar] [CrossRef]
  25. Fuchs, C.A.; Caves, C.M. Mathematical techniques for quantum communication theory. Open Syst. Inf. Dyn. 1995, 3, 345–356. [Google Scholar] [CrossRef] [Green Version]
  26. Barnum, H.; Caves, C.M.; Fuchs, C.A.; Jozsa, R.; Schumacher, B. Noncommuting Mixed States Cannot Be Broadcast. Phys. Rev. Lett. 1996, 76, 2818–2821. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Miyadera, T.; Imai, H. State collapse in Information Transfer and its applications. In Proceedings of the 2008 Symposium on Cryptography and Information Security, Miyazaki, Japan, 22–25 January 2008; p. 2D2-4. [Google Scholar]
Figure 1. The QKD protocol by using the mean multi-kings’ problem.
Figure 1. The QKD protocol by using the mean multi-kings’ problem.
Entropy 22 01275 g001
Figure 2. The QKD protocols using the mean-king’s problem (left hand side) and BB84 protocols (right hand side) for Alice and the kings to share the secret key.
Figure 2. The QKD protocols using the mean-king’s problem (left hand side) and BB84 protocols (right hand side) for Alice and the kings to share the secret key.
Entropy 22 01275 g002
Figure 3. The interaction H K 1 with H E .
Figure 3. The interaction H K 1 with H E .
Entropy 22 01275 g003
Figure 4. The interaction H K 1 H K 2 with H E .
Figure 4. The interaction H K 1 H K 2 with H E .
Entropy 22 01275 g004
Table 1. The relationship among kings’ measurements J 1 , J 2 , Alice’s outcome k, and kings’ outcomes i 1 , i 2 when she chooses | Φ ( W ) . In this table, NA means that probability of obtaining the corresponding outcome k is zero unless Eve performs an attack because the corresponding matrix P k ( W ) is a zero matrix. An example of Alice’s guessing: Alice is assured that kings’ outcome ( i 1 , i 2 ) is ( 0 , 0 ) when W = Z , J 1 = 0 , J 2 = 0 , and k = ( 0 , 0 , 0 , 0 ) .
Table 1. The relationship among kings’ measurements J 1 , J 2 , Alice’s outcome k, and kings’ outcomes i 1 , i 2 when she chooses | Φ ( W ) . In this table, NA means that probability of obtaining the corresponding outcome k is zero unless Eve performs an attack because the corresponding matrix P k ( W ) is a zero matrix. An example of Alice’s guessing: Alice is assured that kings’ outcome ( i 1 , i 2 ) is ( 0 , 0 ) when W = Z , J 1 = 0 , J 2 = 0 , and k = ( 0 , 0 , 0 , 0 ) .
W = Z , J 1 = 0 , J 2 = 0 W = Z , J 1 = 0 , J 2 = 1 W = Z , J 1 = 1 , J 2 = 0 W = Z , J 1 = 1 , J 2 = 1
W = X , J 1 = 1 , J 2 = 1 W = X , J 1 = 1 , J 2 = 0 W = X , J 1 = 0 , J 2 = 1 W = X , J 1 = 0 , J 2 = 0
k ( i 1 , i 2 ) k ( i 1 , i 2 ) k ( i 1 , i 2 ) k ( i 1 , i 2 )
( 0 , 0 , 0 , 0 ) ( 0 , 0 ) ( 0 , 0 , 0 , 0 ) ( 0 , 0 ) ( 0 , 0 , 0 , 0 ) ( 0 , 0 ) ( 0 , 0 , 0 , 0 ) ( 0 , 0 )
( 0 , 0 , 0 , 1 ) NA—— ( 0 , 0 , 0 , 1 ) NA—— ( 0 , 0 , 0 , 1 ) NA—— ( 0 , 0 , 0 , 1 ) NA——
( 0 , 0 , 1 , 0 ) ( 0 , 0 ) ( 0 , 0 , 1 , 0 ) ( 0 , 1 ) ( 0 , 0 , 1 , 0 ) ( 0 , 0 ) ( 0 , 0 , 1 , 0 ) ( 0 , 1 )
( 0 , 0 , 1 , 1 ) NA—— ( 0 , 0 , 1 , 1 ) NA—— ( 0 , 0 , 1 , 1 ) NA—— ( 0 , 0 , 1 , 1 ) NA——
( 0 , 1 , 0 , 0 ) NA—— ( 0 , 1 , 0 , 0 ) NA—— ( 0 , 1 , 0 , 0 ) NA—— ( 0 , 1 , 0 , 0 ) NA——
( 0 , 1 , 0 , 1 ) ( 1 , 1 ) ( 0 , 1 , 0 , 1 ) ( 1 , 0 ) ( 0 , 1 , 0 , 1 ) ( 0 , 1 ) ( 0 , 1 , 0 , 1 ) ( 0 , 0 )
( 0 , 1 , 1 , 0 ) NA—— ( 0 , 1 , 1 , 0 ) NA—— ( 0 , 1 , 1 , 0 ) NA—— ( 0 , 1 , 1 , 0 ) NA——
( 0 , 1 , 1 , 1 ) ( 1 , 1 ) ( 0 , 1 , 1 , 1 ) ( 1 , 1 ) ( 0 , 1 , 1 , 1 ) ( 0 , 1 ) ( 0 , 1 , 1 , 1 ) ( 0 , 1 )
( 1 , 0 , 0 , 0 ) ( 0 , 0 ) ( 1 , 0 , 0 , 0 ) ( 0 , 0 ) ( 1 , 0 , 0 , 0 ) ( 1 , 0 ) ( 1 , 0 , 0 , 0 ) ( 1 , 0 )
( 1 , 0 , 0 , 1 ) NA—— ( 1 , 0 , 0 , 1 ) NA—— ( 1 , 0 , 0 , 1 ) NA—— ( 1 , 0 , 0 , 1 ) NA——
( 1 , 0 , 1 , 0 ) ( 0 , 0 ) ( 1 , 0 , 1 , 0 ) ( 0 , 1 ) ( 1 , 0 , 1 , 0 ) ( 1 , 0 ) ( 1 , 0 , 1 , 0 ) ( 1 , 1 )
( 1 , 0 , 1 , 1 ) NA—— ( 1 , 0 , 1 , 1 ) NA—— ( 1 , 0 , 1 , 1 ) NA—— ( 1 , 0 , 1 , 1 ) NA——
( 1 , 1 , 0 , 0 ) NA—— ( 1 , 1 , 0 , 0 ) NA—— ( 1 , 1 , 0 , 0 ) NA—— ( 1 , 1 , 0 , 0 ) NA——
( 1 , 1 , 0 , 1 ) ( 1 , 1 ) ( 1 , 1 , 0 , 1 ) ( 1 , 0 ) ( 1 , 1 , 0 , 1 ) ( 1 , 1 ) ( 1 , 1 , 0 , 1 ) ( 1 , 0 )
( 1 , 1 , 1 , 0 ) NA—— ( 1 , 1 , 1 , 0 ) NA—— ( 1 , 1 , 1 , 0 ) NA—— ( 1 , 1 , 1 , 0 ) NA——
( 1 , 1 , 1 , 1 ) ( 1 , 1 ) ( 1 , 1 , 1 , 1 ) ( 1 , 1 ) ( 1 , 1 , 1 , 1 ) ( 1 , 1 ) ( 1 , 1 , 1 , 1 ) ( 1 , 1 )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yoshida, M.; Nakayama, A.; Cheng, J. Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem. Entropy 2020, 22, 1275. https://doi.org/10.3390/e22111275

AMA Style

Yoshida M, Nakayama A, Cheng J. Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem. Entropy. 2020; 22(11):1275. https://doi.org/10.3390/e22111275

Chicago/Turabian Style

Yoshida, Masakazu, Ayumu Nakayama, and Jun Cheng. 2020. "Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem" Entropy 22, no. 11: 1275. https://doi.org/10.3390/e22111275

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop