You are on page 1of 4

Optimal eavesdropping in cryptography with three-dimensional quantum states

D. Bruß1 and C. Macchiavello2


1
Institut für Theoretische Physik, Universität Hannover, 30167 Hannover, Germany
2
Dipartimento di Fisica “A. Volta” and INFM-Unità di Pavia, Via Bassi 6, 27100 Pavia, Italy
(Received November 5, 2018)

state of Eve’s system is called | Ai, and her states after


We study optimal eavesdropping in quantum cryptography interaction are labelled | A0 i, | B0 i, ... and are normalised.
with three-dimensional systems, and show that this scheme is
Their dimension is not fixed.
more secure against symmetric attacks than protocols using
two-dimensional states. We generalize the according eaves- We have to satisfy unitarity of U. This leads to the
constraints
arXiv:quant-ph/0106126v2 19 Mar 2002

dropping transformation to arbitrary dimensions, and discuss


the connection with optimal quantum cloning.
r
D(1 − D) D
(hB0 |A0 i + hB1 |A1 i) + hB2 |A2 i = 0 ,
03.67.Dd, 03.67.Hk, 03.67.-a 2 2
r
D(1 − D) D
(hC2 |A2 i + hC0 |A0 i) + hC1 |A1 i = 0 ,
2 2
Quantum cryptography, as first suggested by Bennett r
and Brassard (BB84) [1], is the experimentally most ad- D(1 − D) D
(hC1 |B1 i + hC2 |B2 i) + hC0 |B0 i = 0 .
vanced application of quantum information processing. 2 2
Recently, the use of three-level systems rather than two- (2)
level systems for establishing a secure quantum key has
We consider the cryptographic protocol suggested in
been suggested [2]. The authors study the case of 4 mutu-
Ref. [2], where the four mutually unbiased bases are given
ally unbiased bases, i.e. 12 basis states. They consider an
by {| 0i, | 1i, | 2i}, and
eavesdropper that uses the most simple strategy, namely
measuring the state and resending it. For this case they 1
{| αi = √ (| 0i + | 1i + | 2i) ,
find that a 3-dimensional system leads to a higher secu- 3
rity than a 2-dimensional one. 1
In order to compare the security of different quantum | βi = √ (| 0i + ω| 1i + ω ∗ | 2i) ,
3
key distribution protocols, however, one has to study the 1
most general eavesdropping attack. This is the aim of our | γi = √ (| 0i + ω ∗ | 1i + ω| 2i)} ; (3)
3
work. Optimal eavesdropping strategies for the BB84-
protocol and the six state protocol have been studied in
[3] and [4,5], respectively. 1
{| α′ i = √ (ω| 0i + | 1i + | 2i) ,
We concentrate our attention to incoherent attacks, 3
namely we assume that the eavesdropper interacts with 1
| β ′ i = √ (| 0i + ω| 1i + | 2i) ,
a single 3-dimensional quantum system at a time. We 3
study the case where the action of the eavesdropper 1
disturbs all the possible quantum states by the same | γ ′ i = √ (| 0i + | 1i + ω| 2i)} ; (4)
3
amount. Denoting with {| 0i, | 1i, | 2i} a basis for the sys-
tem, the most general unitary eavesdropping strategy for 1
a set of 3-dimensional states can be written as {| α′′ i = √ (ω ∗ | 0i + | 1i + | 2i) ,
3
√ q q
U| 0i| Ai = 1 − D| 0i| A0 i + D | 1i| A i + D 1
2 1 2 | 2i| A2 i , | β ′′ i = √ (| 0i + ω ∗ | 1i + | 2i) ,
q √ q 3
U| 1i| Ai = D 2 | 0i| B0 i + 1 − D| 1i| B1 i + D 2 | 2i| B2 i , 1
| γ ′′ i = √ (| 0i + | 1i + ω ∗ | 2i)} , (5)
q q √ 3
U| 2i| Ai = D 2 | 0i| C0 i +
D
2 | 1i| C1 i + 1 − D| 2i| C2 i .
2πi

(1) where ω = e .
3

We restrict ourselves to the case of symmetric at-


Here 1 − D is the fidelity of the state that arrives at tacks, i.e. Eve is supposed to introduce an equal dis-
Bob’s site after Eve’s interaction. The disturbance is turbance to all possible input states written above1 .
given by D. We assume the disturbance of the two basis
states that are orthogonal to the original to be equal: this
symmetry is motivated by the fact that the three basis
1
states should be treated in the same manner. The initial If the noise of the physical device is known to be symmetric,

1
We can then directly compare the security to the six mation is maximised for fixed S, i.e. for a given distur-
state scheme for qubits, where only symmetric attacks bance D. We introduce the general parametrisation for
have been studied. By imposing that the disturbance the normalised auxiliary states,
D = 1 − Tr(| ψi ihψi |̺outB ), where ̺B
out
is the reduced
density operator of the state sent on to Bob, takes the | A0 i = xA | 0̄i + yA | 1̄i + zA | 2̄i ,
same value for all 12 possible input states | ψi i, we derive | B1 i = xB | 0̄i + yB | 1̄i + zB | 2̄i ,
the following relations that involve the scalar products of | C2 i = xC | 0̄i + yC | 1̄i + zC | 2̄i , (11)
Eve’s output states:
p where {| 0̄i, | 1̄i, | 2̄i} is an orthonormal basis which is or-
2D(1 − D)(hA1 |A0 i + hB1 |B0 i + hC2 |B0 i + hA1 |C2 i) thogonal to all the other auxiliary states. In order to
+D(hC1 |C0 i + 3hB0 |A1 i) = 0 , (6) treat the basis states | 0i, | 1i, | 2i in the same way, we
require that the overlaps of these three states are equal.
p
2D(1 − D)(hB1 |C0 i + hA2 |B1 i + hA2 |A0 i + hC2 |C0 i)
We choose xA = yB = zC = x, while all other coeffi-
+D(hB2 |B0 i + 3hC0 |A2 i) = 0 , (7)
p cients are equal. Without loss of generality we can take
2D(1 − D)(hB2 |B1 i + hC2 |C1 i + hB2 |A0 i + hA0 |C1 i) the coefficients to be real.
+D(hA2 |A1 i + 3hC1 |B2 i) = 0 , (8) With this strategy we find the optimal mutual infor-
hA1 |C0 i + hA2 |B0 i + hB0 |C1 i mation between Alice and Eve to be
+hB2 |A1 i + hC1 |A2 i + hC0 |B2 i = 0 . (9) IAE = 1 + (1 − D)[f (D) log3 f (D)
1 − f (D)
Note that both real and imaginary part of these expres- +(1 − f (D)) log3 ], (12)
sions have to vanish. Writing the disturbance introduced 2
through the eavesdropping transformation (1) as a func- where f (D) is given by
tion of the scalar products of Eve’s states, and taking
√ p
into account unitarity (2) and the conditions (6)-(9), we 3 − 2D + 2 2 D(3 − 4D)
find the following simple form: f (D) = . (13)
9(1 − D)
1−S The relation between x and D is x2 = f (D). Inserting
D=2 , (10)
3 − 2S this into equations (11) leads, together with the ansatz
where S = Re[hA0 |B1 i + hB1 |C2 i + hC2 |A0 i]/3. Notice (1) and a straightforward choice of the ancilla states,
that in the expression for the disturbance only the scalar to the explicit form of the optimal transformation. Eve
products among the eavesdropper’s states | A0 i, | B1 i and needs to employ two three-level systems for the optimal
| C2 i appear, while all the others do not contribute. attack.
We will now derive the optimal eavesdropping trans- The information for Bob decreases with increasing dis-
formation for a fixed value D of the disturbance, namely turbance:
we maximise the mutual information IAE between Alice D
and Eve. (This is a standard figure of merit for the de- IAB = 1 + (1 − D) log3 (1 − D) + D log3 . (14)
2
scription of the efficiency of an eavesdropping attack [3].)
As mentioned above, the disturbance introduced by Eve Note that we renormalized the functions given in (12)
is independent of the scalar products of her states, apart and (14), as in [2], in order to be able to directly relate
from the ones involving | A0 i, | B1 i and | C2 i. Therefore, the values to the 2-dimensional case.
for any value of D, Eve is free to choose those states on We will now compare the security of the 3-dimensional
which D does not depend in such a way that she retrieves scenario as described above with the most secure 2-
the maximal information. The optimal choice is to take dimensional scheme, that employs six states (i.e. three
all of these states orthogonal to each other, because in mutually unbiased bases) [4,5]. The according informa-
this case Eve can infer the original state sent by Alice in tion curves of both protocols are shown in figure 1.
an unambiguous way from her measured state. We find that the 3-dimensional protocol is more se-
We will now consider only the scalar products that cure in two respects: first, the information curves for
appear in S and choose them such that the mutual infor- Bob and Eve intersect at a higher disturbance Dc than
for the 2-dimensional case, namely Dc,3 = 0.227, while
Dc,2 = 0.156. In other words, Eve has to introduce more
noise in order to gain the same information as Bob. In
then Alice and Bob could detect an asymmetric eavesdropper general, for disturbances D < Dc , a key distribution
by checking the error rate in a subset of states. Otherwise, protocol can be considered secure, because IAB > IAE
the trade-off between Eve’s information and the signal key is [3]. Therefore, the 3-dimensional protocol is secure up
more complicated to handle. to higher disturbances. Second, for a fixed disturbance

2
scalar products between | A0 i, | B1 i, .... The function f is
then given by
p
d − 2D + (d − 2D)2 − d2 (1 − 2D)2
fd (D) = . (17)
d2 (1 − D)
In figure 2 we plot Eve’s corresponding information
IAE,d = 1 + (1 − D)[fd (D) logd fd (D)
1 − fd (D)
+(1 − fd (D)) logd ], (18)
d−1
as a function of the dimension d for a fixed value of the
disturbance D. We conjecture that this mutual informa-
tion is optimal when employing the maximal number of
FIG. 1. Mutual information for Alice/Bob and Alice/Eve mutually unbiased bases for a given dimension [6].
as a function of the disturbance, for 2-dimensional and 3-di-
mensional quantum states.

D < Dc , Bob gets more and Eve less information than in


the 2-dimensional case. The price that has to be payed
for higher security is a lower efficiency: the basis for Bob
matches the one of Alice in fewer cases than for two di-
mensions, as the number of bases is increased.
Notice that our derivation of the optimal eavesdrop-
ping transformation relies on equations (6)-(9) which
guarantee that all the possible input states are disturbed
in the same way. If we reduce the number of bases, not
all of these conditions will be necessary, thus leading to
a less simple structure of D than the one given in (10).
This would allow a different general form of the opti- FIG. 2. Mutual information between Eve and Alice as a
mal eavesdropping transformation, and a higher curve function of the dimension, for D = 0.1.
for IAE . The analogous behaviour was shown for the
2-dimensional case in [4,5], where the six-state protocol Finally, we discuss the connection between optimal
and the BB84 scheme were compared. eavesdropping strategies and optimal cloning transforma-
Generalising the ansatz given in (1) and the structure tions. The information that Eve can gain is restricted by
of the ancilla states as in (11) to higher dimensions, we the laws of quantum mechanics, namely the no-cloning
find a lower bound on the eavesdropper’s information for theorem [7]. Let us point out, however, that there is,
quantum cryptography with d-dimensional systems. The in general, no direct connection between limits on the
general ansatz is then cloning fidelity for a given d-dimensional state, and the
√ q intersection of the information curves of Bob and Eve.
D
U| 0i| Ai = 1 − D| 0i| A0 i + d−1 | 1i| A1 i + ... , The reason is that approximate cloning transformations
q √ [8] are only a subset of our family of transformations U
D
U| 1i| Ai = d−1 | 0i| B0 i + 1 − D| 1i| B1 i + ... , given in eq. (1), because an additional symmetry be-
.. tween the first of Eve’s states and Bob’s state is required
. q q for cloning. Indeed, if Eve would read only the first of her
U| d − 1i| Ai = d−1D D
| 0i| Z0 i + d−1 | 1i| Z1 i + ... . two states, the disturbance for the intersection between
the two resulting information curves would correspond
(15) to the fidelity of the optimal cloner. Reading both states
increases her information. Therefore, the knowledge of
(The alphabet denoting Eve’s states is supposed to con-
cloning transformations for d-dimensional systems [9] al-
tain d letters.) The according generalized formula for the
lows only to find a lower bound on Eve’s information at
disturbance as a function of the scalar products is
a given disturbance.
(d − 1)(1 − S) In summary, we have found a remarkable feature of
D= , (16) higher-dimensional quantum systems: we have proven
d − S(d − 1)
analytically for dimension d = 3 that the most gen-
where S is now the real part of the average of all possible eral symmetric attack of an eavesdropper gives her less

3
information than in the case of qubits. Therefore a
three-dimensional scheme offers higher security than two-
dimensional systems. We generalised the upper limit for
Eve’s information IAE from d = 3 to higher dimensions:
this limit decreases with the dimension, and numerically
we find that it reaches IAE = D in the limit d → ∞.
As quantum cryptography is the most advanced tech-
nology in quantum information, and security issues play
a fundamental role in any study of cryptography, it is
important to discuss quantitative properties of the secu-
rity in quantum key distribution: here quantity becomes
quality.
While completing this manuscript we learnt about re-
lated work by M. Bourennane et al [10].
We wish to thank Maciej Lewenstein for discus-
sions. This work has been supported by DFG (Schwer-
punkt “Quanteninformationsverarbeitung”), the ESF-
Programme PESC, and the EU IST-Programme EQUIP.

[1] C. H. Bennett and G. Brassard, in Proceedings of the


IEEE International Conference on Computers, Systems,
and Signal Processing, Bangalore, India (IEEE, New
York, 1984), pp. 175-179.
[2] H. Bechmann-Pasquinucci and A. Peres, quant-
ph/0001083.
[3] C. Fuchs, N. Gisin, R. Griffiths, C.-S. Niu and A. Peres,
Phys. Rev. A 56, 1163 (1997).
[4] D. Bruß, Phys. Rev. Lett. 81, 3018 (1998).
[5] H. Bechmann-Pasquinucci and N. Gisin, Phys. Rev. A
59, 4238 (1999).
[6] S. Bandyopadhyay, P. Boykin, V. Roychowdhury and F.
Vatan, quant-ph/0103162.
[7] W.K. Wootters and W.H. Zurek, Nature 299, 802 (1982).
[8] V. Bužek and M. Hillery, Phys. Rev. A 54, 1844 (1996);
N. Gisin and S. Massar, Phys. Rev. Lett. 79, 2153 (1997);
D. Bruß, D. P. DiVincenzo, A. Ekert, C. A. Fuchs, C.
Macchiavello and J. A. Smolin, Phys. Rev. A57, 2368
(1998); R. Werner, Phys. Rev. A58, 1827 (1998).
[9] S. Albeverio and S.-M. Fei, Eur. Phys. J. B 14, 669
(2000).
[10] M. Bourennane, A. Karlsson, G. Björk, N. Gisin and
N. Cerf, quant-ph/0106049; N. Cerf, M. Bourennane, A.
Karlsson and N. Gisin, quant-ph/0107130.

You might also like