Abstract
Postselective transformations of quantum states is a broader class of operations than deterministic quantum channels. Here, we describe the possibility of increasing the success probability of postselective operations by using additional information, which has a form of pure quantum states and should not be changed in case of success. We describe the conditions under which assistance becomes useful, and provide application of our method which improves the efficiency of photon number splitting attack for a variant of SARG04 quantum key distribution protocol. In our attack scenario, one extra photon, which is unchanged, plays the role of assistance.
Keywords:
quantum channels; quantum postselective transformations; unambiguous state discrimination; quantum cryptography MSC:
81P45; 81P15; 81P94
1. Introduction
The question of what can be done and what cannot be done plays key role in quantum theory. For example, the no-cloning theorem [1], which states that arbitrary quantum state cannot be cloned, plays essential role in quantum key distribution [2,3]. Nevertheless, if one does not require the transformation to be deterministic, the class of possible operations becomes significantly broader [4]. An important example is unambiguous state discrimination (USD) [5,6,7], which performs perfect discrimination with nonunit success probability. Hence, there are many transformations which are possible with some probability, but cannot be performed deterministically. In the sequel, we will call such transformations postselective, as after their application the participants know whether they succeed or not. A reasonable task is to find bounds for success probability for some postselective transformations [4,8].
It might happen that participants have additional information which may help to perform the required transformation, i.e., to enlarge the possible success probability. Here, we consider this additional information has the form of pure quantum states, and let us impose additional requirement that these states should not be changed in case of success, thus playing the role of a catalyst.
We are therefore concerned with the question how helpful can be a particular assistance. In Section 2, we will give several examples of useful assistance, and provide a sufficient condition for being useful, namely, linear independence. We also consider the problem of requesting sufficient assistance for the desired enlargement of success probability, which implies that, for minor improvements, only small assistance is enough.
The practical example when such kind of assistance is helpful is the case of eavesdropping in quantum key distribution. The eavesdropper might possess several photons, each in the same state, but in case of zero-error attack, they must leave one photon for the receiver side without being modified, in case of success. Hence, this photon is exactly the kind of assistance being studied. Hence, it helps to enlarge success probability for the transformation on the remaining photons. We will consider this example in detail in Section 3, thus providing practical application for our results. Finally, we conclude in Section 4.
2. Enlarging Success Probability with Assistance
2.1. Examples for Assisted Transformations
Before providing general results, let us first consider several examples when additional information may help to increase the success probability of the given transformation.
Example 1.
Unambiguous discrimination between two states. Consider two non-orthogonal pure states, , and , with for some . The operation of unambiguous state discrimination [5,6,7] either provides full knowledge or yields an inconclusive result. It may be described with the positive operator-valued measure (POVM),
This symmetric measurement yields conclusive result (0 or 1) with success probability
and this measurement is error-free, i.e., . Hence, if one sacrifices unit success probability, error-free discrimination between non-orthogonal states becomes possible.
Now, consider additional assistance, which has the form of two quantum states, and , with . These states are attached to the original states, so the states which should be discriminated become
These states are clearly easier to distinguish, and total success probability becomes
Hence, this assistance allows us to increase the success probability for USD. Let us impose the additional requirement that assistance should not be affected in the case of success, hence the total transformation for USD in case of success reads
where . The orthogonality of output states allows us to prepare any output state, including the one with attached states or , which mean maintaining the assistance states. Hence, this assistance plays the role of catalyst, and is not affected in case of success.
Example 2.
Unambiguous discrimination between multiple copies of linearly dependent states. The next example shows how an impossible task becomes possible with assistance. It is widely known that USD cannot be performed for linearly dependent states. The simple reason is that the system in the subspace of lower rank cannot be mapped on the subsystem of higher rank. But in ref. [9], Chefles addressed the issue of unambiguous discrimination between multiple copies of linearly dependent states in D-dimensional Hilbert space . It was shown that for a certain number C of copies, namely , the states become linearly independent, hence possible for USD. Similarly to Example 1, additional systems may be considered as assistance, and in case of success, they can be restored perfectly, and the transformation reads
where again form an orthonormal basis.
Example 3.
Soft filtering of two states. As an example besides USD, let us consider a probabilistic increase in the distinguishability [10], which may be viewed as a partial application of USD [11]. Stinesprind representation for soft filtering of two states reads
where and are mutually orthogonal auxillary vectors, which provide information about success or failure of the operation, and is some vector in the output state. This operation either maps the states to more distinguishable states with success flag , or destroys the states and yields failure outcome . Unitarity condition results in the following success probability:
where , and .
Let us now consider soft filtering assisted by the states , Stinespring representation becomes
and success probability (with ) reads
which is larger than original success probability (9) for any . Hence, the assistance allows us to increase success probability.
Note that the requirement that assistance should not be affected plays important role, because without this requirement, the transformation would read
and its success probability
is larger than given by (12). Such an effect does not take place for USD operation, because in case of success the output signals are perfectly distinguishable, and it is a “free” operation to restore the assistance states. In case of soft filtering, this restoring is not free, and the overall success probability is lower.
2.2. Improvement with Linearly Independent Assistance
Let us now use the results of ref. [8] to formalize the advantage from assistance. In the sequel, we consider postselective operations with the same success probability for each state, which is particular case of ref. [8] results.
Consider the sets and of pure quantum states in Hilbert space for input and output, respectively. Their Gram matrices read
Consider the transformation (i.e., quantum instrument [12]) which, in case of success, performs the following mapping
Theorem 1 in ref. [8] states that there exists quantum instrument which performs map (18) with success probability
where quantum max-relative entropy [13] is defined as
or, if is invertible,
Hence, non-negativity of the matrix is a sufficient condition for to be the success probability for some operation which performs (18).
With assistance , the map (18) takes the form
and the condition for new success probability becomes
where is the assistance Gram matrix, and is the element-wise (Hadamard) product.
Hence, the role of assistance for transformations between pure states is the increase in minimal eigenvalue of the matrix
after Hadamard product with the assistance Gram matrix :
It is clear that assistance cannot decrease success probability, since the assistance subsystem may just be not involved onto transformation.
Let us now show that assistance with linearly independent states is helpful for every transformation.
Theorem 1.
Linearly independent assistance increases success probability for any transformation with .
Proof.
Maximal success probability implies that the matrix is non-negative and degenerate, hence the matrix
is the Gram matrix for some set of linearly dependent states . Let us now show that is nondegenerate, if is the Gram matrix for some linearly independent assistance .
Assume the contrary: let be degenerate. Hence, the set is linearly dependent, and there exists the set of coefficients such that
Without loss of generality, assume that , and consider the coefficients , for which
Now, taking into account that , we have found the coefficients such that
which contradicts linear independence of . Hence, is nondegenerate, and it is the Gram matrix for linearly independent set , which implies . Hence, if we rewrite (23) with assistance,
we can easily see that may be enlarged to make degenerate. □
Let us take a closer look at this theorem to find the increased success probability value. Equation (23) can be written as
which is connected with the unitarity condition for every pair of states at the input and at the output:
Hence, plays the role of the Gram matrix for the set of states in case of failure. With assistance, this expression takes the form
and let us now find the new success probability . Let be the minimal eigenvalue for , and, for linearly independent assistance, it is positive, thus is non-negative, and we can rewrite (26) as
which, if we use notation
results in
where now is Gramian matrix for the vectors in case of failure, and the term can be used to modify the success probability. Indeed, if we denote
the final unitarity condition becomes
hence, the new success probability reads
which is greater than as . When success probability of initial transformation is 1, it is deterministic, and cannot be improved with our method.
For linearly dependent assistance, both options are possible: it might be helpful, and might be not. Example 2 with multiple copies of linearly dependent states demonstrates both effects: when the number of copies is insufficient, assistance is not helpful, but for a sufficiently large number of copies, it works fine and makes USD operation possible (i.e., increases its success probability from zero to non-zero value). Other example of linearly dependent assistance will be given in Section 3.
2.3. Requesting for Assistance
Let us now consider the problem of requesting a relatively small assistance to achieve the desired success probability. Consider a set of input states , a set of output states , and the corresponding maximal success probability . Now, let the desired success probability be . The question arises as to what is sufficient assistance for achieving this success probability increase. It is trivial that the set of orthogonal states is a perfect assistance, but let us find a small assistance, which tends to the set of coinciding vectors when tends to zero.
Since is greater than maximal success probability , it follows from ref. [8] that the operator has negative eigenvalues. Let be the minimal eigenvalue of . Now, observe that has the same eigenvectors as , and all its eigenvalues are non-negative. Let us thus consider assistance with Gram matrix such that
because it would imply that
which means the possibility to implement this transformation with success probability .
Let us now find for (27). This element-wise product should increase diagonal elements, which is equivalent to decreasing all the other elements, taking into account that non-negativity is the main priority. Hence, let us consider where all diagonal elements equal 1, and all off-diagonal elements equal . Minimal eigenvalues for such matrix are ; hence, is it non-negative.
It is now straightforward to see that, since diagonal elements of equal ,
and, after Hadamard product with , the minimal eigenvalue becomes , which turns to zero when
hence, we have found c for which meets requirement (27). Assistance provided by the Gram matrix is “small”, as for small values of required improvement , takes small negative values, thus inner products c for the assistance states given by (28) (which are the elements of the Gram matrix) are also close to identity, which means “small” assistance. For , all elements of the Gram matrix equal 1, hence assistance is just a set of coinciding states, which is the same as “no assistance”.
Let us now summarize the result above as follows.
Theorem 2.
Let and be the sets of input and output states with the Gram matrices and , respectively. Let be the desired success probability, and let be the minimal eigenvalue of . Then, the assistance states are sufficient to achieve success probability , if
As a simple example of such construction, let us again consider unambiguous discrimination between two non-orthogonal states (Example 1). Here, the input and output Gram matrices and are
and if the desired success probability is above , the minimal eigenvalue of
becomes negative and equals . Hence, assistance needed to ensure this success probability, has the Gram matrix
where, according to (28),
which agrees with the expression in Example 1, as .
3. Improved Photon Number Splitting Attack in Quantum Key Distribution
Let us now consider a possible application of the proposed method, namely an improvement in the photon number splitting (PNS) attack [14,15] efficiency.
In PNS attack scenario, available when phase-randomized coherent states are used by the legitimate users, the eavesdropper uses quantum nondemolition (QND) measurement to determine the number of photons in each pulse. Then, the eavesdropper blocks the pulse or sends one photon to Bob, after certain actions, which may include (see, e.g., ref. [16]) storing some photons in the eavesdropper’s quantum memory, unambiguous discrimination between the states, and some other actions.
Let us consider the case of zero-error attacks, which mean that the photon which reaches Bob, should not cause errors, when it is not blocked. This photon then plays exactly the role of assistance, since it may be blocked or should remain in the same state. Our idea is to include this protocol in the transformation performed by the eavesdropper (Eve). Such a transformation was already mentioned in ref. [16] in case of USD transformation, but here we propose a more general and, for some cases, more effective operation.
Let us now briefly describe the protocol under study which is a version of SARG04 protocol [16,17]. This protocol uses four states , separated in two bases, a and b, with the following configuration:
The motivation of this configuration is the following: if Eve stores one photon in her quantum memory, she cannot extract full information because states within each basis are not orthogonal, unlike BB84 protocol. And, unlike the “4 + 2” protocol [14], Eve cannot perform a filtering operation [16] which maps the states (30) on the states of BB84 protocol [18], for which full information extraction becomes available. Every transformation which makes the states of a-basis orthogonal, makes the states of b-basis less distinguishable, as shown in ref. [16].
Let us describe an example of attack, which provides Eve with full information, proposed in ref. [16]. This attack is based on selective filtering operation with Kraus operators which, for a-basis, read
where , and the state is orthogonal to . The similar operation works for b-basis.
The following attack was proposed in ref. [16]:
So, now Eve has to consider two different filters and that make the states in set a and set b orthogonal, respectively. If she wants to receive all the information about the bit sent by Alice, she has to block all the pulses with less than three photons. When the pulse contains three photons, she applies to the first one, to the second one, and only when both of them are conclusive, she forwards the third photon to Bob.
We consider this PNS-like attack scenario as not completely effective, since there is one extra photon available at the moment of attack, which is not involved in the eavesdropping transformation. Hence, this photon can be considered as a good example of assistance, as it is not needed in case of failure, but should maintain its initial state in case of success. Hence, we will describe the improved version of the attack scenario quoted above.
In the sequel, we will consider the described protocol with states configuration (30), but let us note that the more conventional version of four-states SARG04 protocol, also described in refs. [16,17], is slightly different: it uses the value , and random choice of the basis among four (instead of two) options. The proposed attack is not effective against this four-state version, but may, after certain modification, be effective against a version of SARG04 with a larger number of states, described in Section IV of ref. [16].
Let us now describe a postselective transformation, which uses assistance and is more effective than the attack scenario proposed in ref. [16]; namely, it has larger success probability for Eve to obtain full information.
The Gram matrix of the input three-photon states reads
where
is the Gram matrix for single-photon states (30).
The condition for success probability therefore reads
where is the Gram matrix for output states of the eavesdropper, and the last G plays the role of assistance. The goal of Eve is to make the states within each basis (a and b) orthogonal, which in terms of the Gram matrix elements means . Let us consider the following parameters:
It follows from that , which implies that , hence is non-negative. Now, it is straightforward to see that
is non-negative, thus success probability can be achieved. Hence, Eve can make orthogonal the states in her quantum memory, which corresponds to both bases a and b, and the success probability is .
Let us observe that is the best possible success probability for transformation, which makes the states orthogonal, as , so this success probability cannot be improved. Hence, we have constructed a transformation which performs filtering for both bases which success probability equals the one for filtering in just one basis. The only important requirement is that this transformation should involve the third photon, which preserves its original state in case of success.
It is straightforward to see that our proposition allows for much higher success probability than original PNS-like attack scenario quoted above. Filtering of one photon has success probability , which is the same as for USD. For both photons, success probability becomes , a value much smaller than . For example, for , the values are
and our proposition demonstrates dramatic improvement. Here, we again see that collective transformations over several photons are more effective than individual operations [19,20,21]. Let us also note that in general case this attack may be combined with single-photon attack [22], when Eve is not allowed to block all the pulses with less than three photons.
In [16], a PNS attack with unambiguous state discrimination is also studied, which utilized unambiguous discrimination between the four signals, each containing three photons in the same state. This operation has success probability . It is also not an optimal attack, since USD performs extra work: it discriminates between all the states, and does not uses basis announcement which happens later. But, taking into account the basis announcement, Eve’s task is simplified: she just needs to make the states within each basis well-distinguishable, which happens in our case.
Let us once again stress that here we consider a variant of SARG04, which demonstrates the motivation of its basis configuration. The final version of SARG04 uses a more integrated communication between legitimate users, not just basis announcement (a or b). The described attack, which performs information extraction in two bases, is no more effective (unlike the USD attack described by the authors of the SARG04 protocol), and becomes an example of assistance-based version of PNS-attack, which demonstrates that for some of the QKD protocols, the photon which is sent to Bob, should also be involved in Eve’s transformation, and it might improve the eavesdropping efficiency. Such improvement does not happen for decoy state BB84 protocol [23], as only single-photon pulses contribute the key in this protocol, but it should be taken into account for other coherent states quantum key distribution protocols.
4. Conclusions
In this work, we study postselective quantum transformations, and consider the case of external assistance which takes the form of quantum states. These states should not be damaged in case of success, hence they may be regarded as a sort of catalyst for original transformations.
We considered the transformation where success probability is the same for every state, leaving more general case for further study.
We have shown that assistance with linearly independent states is always helpful, as it allows us to increase a non-unit success probability for any transformation. It is an example of helpful integration with environment, which is usually the case for postselective state transformations [8,24].
We also considered the problem of requesting a sufficient assistance, which should be small for small success probability improvement. We demonstrated that the proposed method is effective for the example of unambiguous state discrimination between two states, as the requested sufficient assistance turns out to be necessary as well.
We also considered a practical example, a PNS-like eavesdropping for a variant of SARG04 quantum key distribution protocol. Here, as the eavesdropper deals with a certain number of photons, the photon which is sent to the receiver meets the conditions of assistance. While the protocol states configuration resists making the states in both bases orthogonal, we show that such orthogonalization happens with much higher success probability when the third photon is also involved. We consider PNS-like attack scenarios in quantum cryptography to be important practical application for our study.
Author Contributions
Conceptualization, D.K.; investigation, T.K. and D.K.; writing, D.K. All authors have read and agreed to the published version of the manuscript.
Funding
This work was funded by the Ministry of Science and Higher Education of the Russian Federation (Grant No. 075-15-2020-788).
Data Availability Statement
No new data were created or analyzed in this study. Data sharing is not applicable to this article.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| QKD | Quantum key distribution |
| PNS | Photon number splitting |
| USD | Unambiguous state discrimination |
| SARG04 | Quantum key distribution protocol by Scarani, Acín, Ribordy, Gisin, 2004 |
References
- Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
- Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef]
- Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
- Chefles, A.; Jozsa, R.; Winter, A. On the existence of physical transformations between sets of quantum states. Int. J. Quant. Inf. 2004, 2, 11–21. [Google Scholar] [CrossRef]
- Ivanovic, I. How to differentiate between non-orthogonal states. Phys. Lett. A 1987, 123, 257–259. [Google Scholar] [CrossRef]
- Dieks, D. Overlap and distinguishability of quantum states. Phys. Lett. A 1988, 126, 303–306. [Google Scholar] [CrossRef]
- Peres, A. How to differentiate between non-orthogonal states. Phys. Lett. A 1988, 128, 19. [Google Scholar] [CrossRef]
- Kronberg, D.A. Success probability for postselective transformations of pure quantum states. Phys. Rev. A 2022, 106, 042447. [Google Scholar] [CrossRef]
- Chefles, A. Unambiguous discrimination between linearly dependent states with multiple copies. Phys. Rev. A 2001, 64, 062305. [Google Scholar] [CrossRef]
- Kronberg, D.A.; Nikolaeva, A.S.; Kurochkin, Y.V.; Fedorov, A.K. Quantum soft filtering for the improved security analysis of the coherent one-way quantum-key-distribution protocol. Phys. Rev. A 2020, 101, 032334. [Google Scholar] [CrossRef]
- Kronberg, D.A. Increasing the distinguishability of quantum states with an arbitrary success probability. Proc. Steklov Inst. Math. 2021, 313, 113–119. [Google Scholar] [CrossRef]
- Davies, E.B.; Lewis, J.T. An operational approach to quantum probability. Commun. Math. Phys. 1970, 17, 239–260. [Google Scholar] [CrossRef]
- Datta, N. Min-and max-relative entropies and a new entanglement monotone. IEEE Trans. Inf. Theory 2009, 55, 2816–2826. [Google Scholar] [CrossRef]
- Huttner, B.; Imoto, N.; Gisin, N.; Mor, T. Quantum cryptography with coherent states. Phys. Rev. A 1995, 51, 1863. [Google Scholar] [CrossRef] [PubMed]
- Brassard, G.; Lütkenhaus, N.; Mor, T.; Sanders, B.C. Limitations on practical quantum cryptography. Phys. Rev. Lett. 2000, 85, 1330. [Google Scholar] [CrossRef] [PubMed]
- Acin, A.; Gisin, N.; Scarani, V. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks. Phys. Rev. A 2004, 69, 012309. [Google Scholar] [CrossRef]
- Scarani, V.; Acin, A.; Ribordy, G.; Gisin, N. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 2004, 92, 057901. [Google Scholar] [CrossRef] [PubMed]
- Bennett, C.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 1984, 560, 175–179. [Google Scholar] [CrossRef]
- Holevo, A.S. Quantum coding theorems. Russ. Math. Surv. 1998, 53, 1295–1331. [Google Scholar] [CrossRef]
- Sasaki, M.; Kato, K.; Izutsu, M.; Hirota, O. Quantum channels showing superadditivity in classical capacity. Phys. Rev. A 1998, 58, 146–158. [Google Scholar] [CrossRef]
- Hastings, M.B. Superadditivity of communication capacity using entangled inputs. Nat. Phys. 2009, 5, 255–257. [Google Scholar] [CrossRef]
- Kronberg, D.A.; Molotkov, S.N. Robustness of quantum cryptography: SARG04 key-distribution protocol. Laser Phys. 2009, 19, 884–893. [Google Scholar] [CrossRef]
- Lo, H.K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef] [PubMed]
- Kenbaev, N.R.; Kronberg, D.A. Quantum postselective measurements: Sufficient condition for overcoming the Holevo bound and the role of max-relative entropy. Phys. Rev. A 2022, 105, 012609. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).