Abstract: In my previous article, I theoretically described how the quantum key distribution protocol Ekert, which uses streams of entangled qubit pairs, works, referring to [1]. This time, for each individual qubit, an orthonormal basis is randomly chosen and the measurements are simulated. As a result, confirm that the same conclusion (probability value) as the theory is obtained. A mobile application for this purpose was developed using MIT App Inventor. By creating such an app, we can deepen our understanding of measurements involving quantum entanglement.
●What can you do with the mobile app?
The app logo, shown in Fig. 1, highlights the features of this mobile app. Now the pair of qubits possessed by Alice and Bob are in an entangled state, and they measure each other on different orthonormal bases (hereafter simply called bases). There are three types of bases that can be selected. Without eavesdropping, the probability that both measurements agree is 1/4. If there is eavesdropping, the probability increases to 3/8. This app can verify these theoretical values for a large number of entangled quantum pairs (eg, 3000 pairs).
●Run the mobile app to validate the Ekert protocol
Fig.2 shows an execution example of this application. (a) is the case without wiretapping. First Alice makes the measurements, then Bob makes the measurements. Since the qubit pairs are in entangled states, Bob's measurement depends on Alice's measurement. The theoretical value of the matching probability between the two measurement results is 1/4 (=0.250), but the execution result of this application was 0.254. I'd say it's an almost perfect match.
On the other hand, in the case of eavesdropping, the situation is as shown in Fig.2(b). Suppose Eve has eavesdropped (namely measured) a qubit before Alice and Bob. Alice then measures. It depends on Eve's measurements. After that, when Bob measures, it depends on Eve's, but not on Alice's. This is because the entangled states between qubits have disappeared when Eve measures them. The matching probability between Alice and Bob's measurement results is theoretically 3/8 (0.375), but the application execution result is 0.374. This was also an almost perfect match.
From the above observations, we can say that this app simulates the Ekert protocol correctly. If it is confirmed that there is no eavesdropping as in FIg.2(a), the measurement results of 1001 pairs, which is about one-third of the 3000 pairs, can be shared as a secure quantum key. A great advantage is that there is no need to exchange the key between the two, that is, there is no need to send it to each other. In fact, in this case, ["a",1]["b",1]["b",1]["b",0]["a",0]["c",0]["b",1]["a",1]["a",1]["c",0]["a",1]["a",0] ... match both, so the classical bit string "111000111010..." can be an encryption key.
●Mechanism of the mobile app
The most important parts of this mobile app are shown in Fig.3. This deals with the cases where the results of measuring qubits by the base ① are the classical bits shown in ②. The probability ④ that results in "|0>" when measuring such a qubit with a newly selected basis ③ is stored in the table on the right side of the figure. From such information, we can obtain the result (classical bit) of measuring the qubit by the basis of ③.
0 件のコメント:
コメントを投稿