A Circuit Approach for Implementing Quantum Memory
Transcript of A Circuit Approach for Implementing Quantum Memory
![Page 1: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/1.jpg)
1
Quantum Wireless Intrusion Detection Mechanism
Tien-Sheng Lin1,2, I-Ming Tsai1, and Sy-Yen Kuo1
1.Department of Electric Engineering, National Taiwan University, Taipei, Taiwan
2.Department of International Business Management, Lan Yang Institute of Technology, ILan, Taiwan
![Page 2: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/2.jpg)
2
Outline
• Quantum qubits• The BB84 protocol• The topology• Quantum sharing table• Quantum detection circuit• Conclusions
![Page 3: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/3.jpg)
3
Superposition and Entanglement
|ψ⟩=a|0⟩+b|1⟩
|0⟩
|ψ⟩=a|00⟩+b|11⟩
|ψ⟩=a|0⟩+b|1⟩
Where |0⟩ and |1⟩ are two quantum states Where a and b are complex numbers, and |a|2+|b|2=1
![Page 4: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/4.jpg)
4
The BB84 ProtocolAlice Bob
Eve
1.Send qubits
2.Measure qubits
3.Announce Bases
4.Derive a secret key
Intercept
![Page 5: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/5.jpg)
5
The BB84 Protocol• 1.Alice sends Bob a stream of photons which
have been randomly polarized to one of four states (00, 450, 900, 1350)
• 2.Bob measures the photons in a random sequence of bases
• 3.Alice and Bob publicly announces the sequence of bases they used
• 4.Alice and Bob discard the results that have been measured using different bases, the results left can be used to derive a secret key.
![Page 6: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/6.jpg)
6
The BB84 Protocol
0 0 1 0 1 1 0 0 1 0 1 1
0 0 = = 1 1 0 = 1 = = =
Alice
Bob
Key
![Page 7: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/7.jpg)
7
Indirect Communication
Alice Candy David Bob
Quantum Sharing Table
![Page 8: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/8.jpg)
8
Quantum Sharing Table
|ψ123⟩ Bases |ψc⟩ |ψt⟩ CX1 CX2 R(θ1) R(θ2)
|000⟩ b1b1b3 |z-⟩ |y-⟩ CσZ Cσx R(900) R(300)
|001⟩ b2b1b3 |z-⟩ |y-⟩ Cσx Cσy R(600) R(900)
|010⟩ b1b1b1 |z-⟩ |z+⟩ CH Cσx R(900) R(300)
|011⟩ b2b2b3 |x+⟩ |y-⟩ Cσy Cσy R(600) R(600)
|100⟩ b3b1b2 |z-⟩ |x-⟩ Cσz Cσx R(900) R(450)
|101⟩ b2b2b2 |x-⟩ |x+⟩ CH Cσx R(800) R(500)
|110⟩ b3b3b1 |y+⟩ |z-⟩ Cσx CH R(600) R(400)
|111⟩ b1b2b2 |x-⟩ |x+⟩ CH Cσy R(900) R(900)
![Page 9: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/9.jpg)
9
Quantum Detection Circuit
Alice Candy David Bob
X1 X1 X2 X2R(-θ1) R(θ1) R(-θ2) R(θ2)
|ψc⟩&|ψt⟩ |ψc⟩&|ψt⟩ |ψc⟩&|ψt⟩
|ψt⟩
|ψc⟩
![Page 10: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/10.jpg)
10
The procedureSender: Alice Candy David Receiver: Bob
|ψc⟩&|ψt⟩
CX2&R(θ2)
|ψxyz⟩&|ψ123⟩
|ψc⟩&|ψt⟩
CX1&R(θ1)
|ψxyz⟩&|ψ123⟩
|ψc⟩&|ψt⟩
CX1& R(θ1)
CX2&R(θ2)
|ψxyz⟩&|ψ123⟩
Acknowledge Acknowledge
Acknowledge Acknowledge
Receive the public from Alice Send quantum identification information to Candy
Receive the secure qubit Measure the secure qubitsEvaluate the
testing rules
Retransmit thepublic keyReceive CX2&R(θ2)Retransmit the information CX1&R(θ1) to CandyApply related quantum gatesSend secure qubits
Retransmit the public keyRetransmit the information CX2&R(θ2) to DavidReceive CX1&R(θ1)Apply related quantum gatesSend secure
qubits
Prepare M pairs of secure qubitsSend the public key to BobSend theinformation CX1&R(θ1) to David Apply related quantum gatesSend secure qubits
• First, quantum information: |ψxyz⟩&|ψ123⟩• Second, quantum information: CX2&R(θ2) and the acknowledge• Third, quantum information: CX1&R(θ1) and the acknowledge• Fourth, quantum information: the secure qubits, |ψc⟩&|ψt⟩
![Page 11: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/11.jpg)
11
Conclusions
• Quantum cryptography is unconditional security.
• Quantum sharing table can act as a secret quantum key.
• Quantum detection circuit can resist man-in-the-middle attack.
• The detection circuit can reconstruct the original quantum states of the secure qubits.
![Page 12: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/12.jpg)
12
Questions and Discussion
☺
![Page 13: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/13.jpg)
13
Three measurement bases:Conjugate
}1,0{1 === −+ zzb
)}10(2
1),10(2
1{2 −=+== −+ xxb
)}10(2
1),10(2
1{3 iyiyb −=+== −+
![Page 14: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/14.jpg)
14
Eve attacks
• A. The BB84 protocol: Based on the no-cloning theorem, Eve can not know the measurement bases and measurement position
• B. The detection mechanism: Eve can not know the quantum states of the secure qubits and Bob can detect it.
![Page 15: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/15.jpg)
15
Question and answer
• 1.What is the major difference between classical cryptography and quantum cryptography
• Quantum cryptography is the unconditionally security and classical cryptography is conditional security; The property of the quantum cryptography is based on the laws of the physics such as no-cloning theorem, uncertainly principle and quantum teleportation. The property of the classical cryptography is based on the computing power.
![Page 16: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/16.jpg)
16
Question and answer
• The major difference between the technology of quantum superposition and the technology of quantum entangled particles.
• To generate, to distribute, to maintain multiple entanglement qubits is the problem.
• The reliability of the quantum computing• The reliability of the quantum communication
![Page 17: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/17.jpg)
17
![Page 18: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/18.jpg)
18
![Page 19: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/19.jpg)
19
![Page 20: A Circuit Approach for Implementing Quantum Memory](https://reader031.fdocuments.us/reader031/viewer/2022021021/6204935d4b1be21e4726db72/html5/thumbnails/20.jpg)
20