Squash Operator and Symmetry
Toyohiro Tsurumaru
arXiv:0910.2326v2 [quant-ph] 19 Oct 2009
Mitsubishi Electric Corporation, Information Technology R&D Center,
5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 Japan.
This paper begins with a simple proof of the existence of squash operators compatible with the
Bennett-Brassard 1984 (BB84) protocol which suits single-mode as well as multi-mode threshold
detectors. The proof shows that, when a given detector is symmetric under cyclic group C4 , and
a certain observable associated with it has rank two as a matrix, then there always exists a corresponding squash operator. Next, we go on to investigate whether the above restriction of ‘rank two’
can be eliminated; i.e., is cyclic symmetry alone sufficient to guarantee the existence of a squash
operator? The motivation behind this question is that, if this were true, it would imply that one
could realize a device-independent and unconditionally secure quantum key distribution protocol.
However, the answer turns out to be negative, and moreover, one can instead prove a no-go theorem
that any symmetry is, by itself, insufficient to guarantee the existence of a squash operator.
Quantum key distribution (QKD) is a technique for
distributing information-theoretically-secure secret keys
between two parties connected by a quantum channel.
The oldest and now defacto standard protocol for QKD
is the well-known Bennett-Brassard 1984 (BB84) protocol [1]. Several different approaches are known today
for proving its unconditional security [2, 3, 4, 5]; e.g.
one based on virtual entanglement distillation protocol
(EDP) [2, 3] and another based on the complementarity
of quantum theory [4].
The most widely used of these approaches is the one
based on EDP, where an actual QKD protocol is converted to an equivalent and virtual EDP performed by
Alice and Bob. The conversions must be made so that
Alice’s and Bob’s quantum operations are seen by Eve
to remain the same positive operator valued measures
(POVM); i.e., Eve’s information regarding the secret key
bits is not changed by conversion. In the original versions
of EDP-based proofs [2, 3], one needed to assume that
the actual protocol had access to a perfect single-photon
source and photon-number resolving detectors. However,
this assumption is invalid for real-world QKD systems,
which use attenuated lasers as light sources, and the receiver uses ‘threshold detectors,’ which can discriminate
a nonzero photon state from the vacuum, but cannot determine the exact photon number.
In fact, techniques are already known that can fill
these gaps. As for light sources, by exploiting decoy
states, lasers can be driven to effectively emit singlephoton pulses [6]. One of the known solutions for detectors [7, 8, 10] is the powerful theoretical tool called
‘squash operator’. Squash operator is a quantum operation which transforms an incoming n-photon state to a
qubit state. By incorporating this operator into a conventional type of security proof where Bob has a photonnumber discriminating detector, one automatically obtains a new proof that remains valid even if threshold
detectors are used. A squash operator was first assumed
in the security proof by Gottesman et al. [3], however, its
existence was only conjectured, no proof was given. For
threshold detectors, which are sensitive only to singlemode photon pulses, its existence was proved first by the
present author and Tamaki [7], and also independently
by Beaudry et al. [8].
The aim of this paper is to investigate how far we can
generalize this result from the viewpoint of symmetry
constraints imposed on the detector. In the first half
of this paper, we show that when a given set of POVM
is symmetric under transformations of cyclic group C4 ,
and the observable Mz related with it has rank two, then
there always exists a corresponding squash operator compatible with the BB84 protocol (Theorem 1). An immediate corollary of this theorem is that a squash operator
exists, not only for single-mode threshold detectors, but
also for multi-mode threshold detectors. Next, in the second half of the paper, we tackle the question of whether
the above restriction of ‘rank two’ can be eliminated. The
answer, however, turns out to be negative. Furthermore,
it can be shown that, more generally, no symmetry is
sufficient by itself to guarantee the existence of a squash
operator (Theorem 2).
Definition of Squash Operator. — In the BB84 protocol, Alice and Bob use two different bases, r, for their
measurements, interchangeably. They are usually denoted as the z and the x basis (r = z, x) because they
are related to qubit measurements of the Pauli matrices
σz , σx . Similarly, the notation of r = +, × bases is used
to indicate the directions of photon polarization. In what
follows, we stick to the notation of r = z, x for the sake
of simplicity.
We denote the Hilbert space of the receiver’s incoming
states as HB . In this space, there are two sets of POVM
elements, M(r,b) , corresponding to basis r = z, x and the
output bit b = 0, 1. We also define observables Mr :=
M(r,0) − M(r,1) for later convenience. For example, if a
receiver measures state ρB ∈ HB using the x basis, he
observes output bit b = 0 with the probability p(x,0) =
Tr ρB M(x,0) . We also assume that the measurements
are complete for each basis; that is,
M(r,0) + M(r,1) = IB
(1)
holds for r = z, x, where IB is the identity operator of
HB .
2
Squash operator F is a completely positive tracepreserving (CPTP) map with the following properties
[14]. F maps states in HB to those in qubit space HC ,
and, when F is followed by the z or the x measurement
in HC , it reproduces Mr of the actual measurement device. That is, for an arbitrary mixed state ρB ∈ HB , it
satisfies
Tr (F (ρB )σr ) = Tr (ρB Mr ) for r = z, x
(2)
with σr being the Pauli operators. A convenient way of
describing F is to use an operator sum representation
with a set of Kraus operators Fc (see, e.g., [12].) In this
notation,
P the trace-preserving condition of F takes the
form c Fc† Fc = IB . Complete positiveness
Pis guaranteed as long as F is expressed as F (ρB ) = c Fc ρB Fc† .
This notation has the additional merit that the Hermi†
tian conjugate,
P F †, of F can be expressed in simple form
†
as F (ρC ) =
Fc ρC Fc with ρc being an arbitrary state
in HC . By using these relations, the definition of squash
operator F for Mr given in (2) can be equivalently stated
as the following two conditions for Kraus operator Fc ,
X
Mr =
Fc† σr Fc ,
(3)
c
IB =
X
Fc† Fc .
(4)
is two, there always exists a corresponding squash operator compatible with the BB84 protocol.
Here, it should be noted that the restriction of ‘rank two’
does not necessarily mean that the Hilbert space HB is
a qubit space, as illustrated by the following example.
An important example of C4 -symmetric POVMs is the
threshold detector. In this paragraph, following [7, 8],
we concentrate on photon detection modules consisting
of two photon threshold detectors, each of which corresponds to output bits b = 0, 1; we call such photon detection units simply ‘threshold detectors’ with a slight abuse
of the terminology. We also assume that, when both detectors click coincidently (double-click events), the detection system outputs a random bit as its output, b.
However, we differ from [7, 8] in that we do not restrict
ourselves to a single mode, but assume that an incoming
light pulse may have m ≥ 1 modes of propagation; we label each of them by index i. We also denote the number
of photons in mode i as ni , and let N = (n1 , n2 , . . . , nm ).
Clearly, any threshold detector is block diagonalized with
respect to the photon number configuration N , and there
is no loss of generality in considering each of the blocks
individually when analyzing security. For each such section, N , the observables Mr can be written as a matrix
with rank two
c
Cyclically Symmetric POVM for the BB84 protocol. —
In the first half of this paper, we show that F actually exists for multi-mode threshold detectors as well. Against
this goal, we generalize the problem slightly by taking up
finite group C4 , i.e., a cyclic group of order 4, and consider POVM elements M(r,b) which are symmetric under
its transformations (for details of C4 group, see, e.g., [9].)
The C4 -symmetry of M(r,b) is stated rigorously as follows.
Definition 1 A set of POVM elements {M(r,b) } of BB84
type is C4 -symmetric, if there exists unitary operator U
satisfying U 4k = IB with k ∈ N, and it transforms them
as follows
U M(z,b) U † = M(x,b) ,
(5)
2
(6)
U M(r,b) U
†2
= M(r,1−b) .
Intuitively, operator U corresponds to rotating a detector
spatially by 45 degrees, when polarization encoding is
used. It can be better seen if we newly define operators
L0 , . . . , L3 as L2b = M(z,b) and L2b+1 = M(x,b) for b =
0, 1. The relations (5) and (6) can thus be rewritten
as U Lc U † = Lc+1 , where modulo 4 is assumed in the
summation of index c. Note here that, with U being a
45-degree rotation, we have U 8 = IB instead of U 4 = IB .
This example demonstrates why we needed to consider
cases of k > 1 in Definition 1.
Theorem 1 If a given set of POVM elements {M(r,b) }
of BB84 type is C4 -symmetric, and the rank of the corresponding observable Mz (or equivalently, Mx ) as a matrix
Mr = |N ; r, 0ihN ; r, 0| − |N ; r, 1ihN ; r, 1|
(7)
for r ∈ {z, x}, where
|N ; r, bi := AN (a†1rb )n1 (a†2rb )n2 · · · (a†mrb )nm |0i.
(8)
Note here that Mr has rank two because double-click
events are replaced by a random bit in our model, and
thus all states besides |N ; r, 0i and |N ; r, 1i are cancelled in the subtraction Mr = M(r,0) − M(r,1) (a similar argument can be found in [10].) Coefficient AN
in (8) is the normalization constant for state |N ; r, bi,
and a†irb are the creation operators for photons propagating in mode i, having bit value b of basis r. In accordance with the usual notations of Pauli matrices, creation operators
a†irb for two
bases r = z, x are related as
a†ixb =
√1
2
a†iz0 + (−1)b a†iz1 . The single-mode thresh-
old detectors discussed in [7, 8] correspond to the special
case of m = 1. C4 -symmetry can be shown by using an
explicit form of the transforming operator UN ,
#
"
i X †
†
UN = exp
aiy0 aiy0 − aiy1 aiy1 .
2 i
The creation operator along the y-axis appearing in
the above equation is defined as a†iyb = (a†iz0 +
√
i(−1)b a†iz1 )/ 2.
From these facts, and also from Theorem 1, it immediately follows that a squash operator exists, not only for
single-mode threshold detectors, but also for multi-mode
threshold detectors.
3
Proof of Theorem 1. Here we give only the proof
for k = 1, since all other cases (k ≥ 2) can be shown
by exactly the same argument. As can be seen from
U 2 Mz U †2 = −Mz , for each normalized eigenstate |vi of
Mz with an eigenvalue 0 < λ ≤ 1, there always exists another eigenstate U 2 |vi having a different eigenvalue −λ,
and thus is orthogonal
hv|U 2 |vi = 0.
(9)
From this, and since the rank of Mz is two, it follows that
Mz takes the form
(10)
Mz = λ |vihv| − U 2 |vihv|U †2 .
By using a basis that diagonalizes U , we can always decompose |vi as
|vi =
3
X
c=0
µc |vc i ,
(11)
with U |vc i = ic |vc i. Then, from (9), we see that coefficients µi satisfy
|µ0 |2 + |µ2 |2 = |µ1 |2 + |µ3 |2 =
1
.
2
(12)
We now define a completely positive, but not necessarily trace-preserving map, F , with a set of Kraus operators
F0 , F1 , . . . , F3 which take the form
√
(13)
Fc = 2λ (µc+1 |0y ihvc | + µc |1y ihvc+1 |)
if µc µ∗c+1 6= 0, otherwise Fc = 0. In (13), modulo 4
is assumed for the summations of index c. From the
linearity of F † , we obtain the following relation
F † (σz + iσx ) =
3
X
Fc† (σz + iσx )Fc
c=0
= 2
3
X
c=0
= λ
3
X
c=0
Fc† |0y ih1y |Fc = 4λ
3
X
c=0
µc µ∗c+1 |vc i hvc+1 |
ic U c |vihv|U †c = Mz + iMx.
(14)
Similarly, from eqs. (12) and (13), we have F † (IC ) =
P3
†
c=0 Fc Fc ≤ IB . Furthermore, F can be modified such
that it satisfies the trace-preserving condition (6), and
also maintains relation F † (σz + iσx ) = Mz + iMx , obtained in (14). This can be done by introducing extra
Kraus operators Fc , c > 3, having the form Fc = |by ihψc |
with b = 0 or 1.
That the CPTP map F thus obtained also satisfies (5) for r = z can be shown as F † (σz ) =
1 †
1
2 F ((σz + iσx ) + H.c.) = 2 (Mz + iMx ) + H.c. = Mz ,
where ‘H.c.’ denotes the Hermitian conjugate. The other
relation for r = x can be shown similarly. (End of proof.)
Does Symmetry Imply the Existence of Squash Operators? — A natural question that arises here is: Can
we eliminate the restriction of ‘rank two’ appearing in
Theorem 1? In other words, is cyclic symmetry C4 alone
sufficient to guarantee the existence of a squash operator?
Or more generally, is there any types of symmetry that
is strong enough to ensure its existence? In the remaining half of this paper, we shall investigate this possibility.
This question is interesting because if this were actually
the case, we would need no knowledge about microscopic
structures of a detector in order to ensure the existence
of its squash operator. In other words, we would succeed
in proving the unconditional security of QKD in a deviceindependent way (for security against collective attacks,
see [13]).
Indeed, C4 -symmetry is already realized in most conventional BB84 systems (c.f. the paragraph below Definition 1). For example, when polarization encoding is
used, bases z, x can be switched by rotating the detector
by 45 degrees. In addition, the receiver may interchange
the assignment of two detectors to output bit b = 0, 1
randomly, by rotating them by 90 degrees and flipping b.
This may be done, in order to cancel the mismatch between two detectors in terms of quantum bit error rate.
These two types of rotation generate a C4 group.
Moreover, for some QKD protocols, no knowledge
about microscopic structures of any components besides
detectors are needed to prove security. For example, consider the Bennett-Brassard-Mermin 1992 protocol [11],
where an untrusted third party prepares an entangled
state. It is clear that if symmetry could actually imply the existence of squash operators, we would be able
to prove the security of a QKD system without knowing
anything of the microscopic structure of the devices, only
the macroscopic operations by Alice and Bob.
However, as we shall show below, that is not actually
the case. The fact is that we can prove a no-go theorem
that denies all such possibilities. In order to discuss this
point rigorously, we define general symmetries of POVM
below, and then present a theorem.
Definition 2 A set of POVM elements {M(r,b) } of BB84
type is symmetric under finite group G, if they transform
under G as
V (g)M(r,b) V † (g) = Mg(r,b) for g ∈ G,
with V (g) being a unitary representation of group G.
Here, map g : (r, b) 7→ (r′ , b′ ) determines how each
POVM element M(r,b) is transformed into another element by g ∈ G.
Theorem 2 No symmetry is sufficient by itself to guarantee the existence of a squash operator. That is, one
cannot prove a theorem that states that ‘For an arbitrary
G-symmetric set of POVM, there always exists a squash
operator compatible with the BB84 protocol.’
We present below a proof of this theorem. The basic
strategy here is to show that, if the type of theorems
as quoted in Theorem 2 holds, it can be used to show
4
the improbable proposition that any arbitrary operator,
whether symmetric or asymmetric, possesses a squash
operator.
Proof of Theorem 2. For an arbitrary set of operators
M(r,b) of BB84 type, which may not be symmetric, one
can always define other G-symmetric operators M̃(r,b) as
M̃(r,b) :=
X
g∈G
Mg−1 (r,b) ⊗ |gihg|
in HB ⊗ HD . Here, HD is an ancilla space which is
spanned by orthonormal basis {|gi}g∈G , that is, a set of
orthonormal states |gi labeled by all elements g ∈ G. M̃
is G-symmetric under unitary transformation Ṽ as defined by Ṽ (g) := idB ⊗ RD (g) with RD being the regular
representation of G defined by RD (g)|hiD = |ghiD (see,
e.g., [9]). Hence if one could prove the type of theorems
quoted in Theorem 2, it would readily follow that there
is a squash operator for M̃(r,b) .
On the contrary, however, once such a F̃ is obtained,
one can also construct squash operator F for the original
operators M(r,b) . In order to see this, note that we have
for an arbitrary ρB ∈ HB
h
i
Tr [Mr ρB ] = Tr M̃r (ρB ⊗ |eihe|)
i
h
= Tr σr F̃ (ρB ⊗ |eihe|) .
with e being the identity element of G. Thus, applying
F̃ on ρB ⊗ |eihe| serves as a correct squash operator for
ρB . This result shows that any POVM M(r,b) of BB84
type, whether symmetric or not, possesses a squash operator. However, this leads to a contradiction because
there exists the counterexample of POVM M0 defined by
M0z = M0x = σz
which has no squash operator.
[1] C. H. Bennett and G. Brassard, in Proceeding of the
IEEE International Conference on Computers, Systems,
and Signal Processing, Bangalore, India (IEEE, New
York, 1984), pp.175-179.
[2] H. -K. Lo and H. F. Chau, Science 283, 2050, (1999);
Shor and Preskill, Phys. Rev. Lett. 85, 441 (2000).
[3] D. Gottesman, H. -K. Lo, N. Lütkenhaus, and J. Preskill,
Quant. Inf. Comput. 5, 325 (2004).
[4] M. Koashi, arXiv:quant-ph/0505108; New J. Phys. 11,
045018 (2009).
[5] B. Kraus, N. Gisin and R. Renner, Phys. Rev. Lett. 95,
080501 (2005); M. Hayashi, Phys. Rev. A 76, 012329
(2007).
[6] W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003); H. K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504
(2005); X. -B. Wang, Phys. Rev. Lett. 94, 230503 (2005).
[7] T. Tsurumaru and K. Tamaki, Phys. Rev. A 78, 032302
The fact that M0 does not possess any squash operator
can be shown, e.g, by the same argument as Beaudry, Moroder, and Lütkenhaus used for the six-state protocol [8],
but it can alternatively be shown by the following simple
argument. Consider the situation where Alice and Bob
perform the BBM92 protocol using M0 as their detectors, and, as the entanglement source, Eve provides states
|ψb i := |bz iA ⊗ |bz iB with a bit b ∈ {0, 1} of her choice.
In this setup, clearly, all sifted key bits b are known to
Eve, and thus Alice and Bob will never succeed in sharing secret keys. Hence, the existence of squash operator
F for M0 would lead to a contradiction, since F could be
used to prove the unconditional security of this system,
with the quantum bit error rate measured by Alice and
Bob being exactly zero. (End of proof.)
Summary. — In this paper, we first showed that, if
a given detector is C4 -symmetric, and the observable
Mz associated with it has rank two, then there always
exists a corresponding squash operator compatible with
the BB84 protocol (Theorem 1). By using this result,
we then proved that squash operators exist, not only for
single-mode threshold detectors, but also for multi-mode
threshold detectors.
Next, we took up the question of whether this result
can be generalized to symmetric detectors with arbitrary
ranks, as an attempt toward the realization of deviceindependent and unconditionally secure QKD protocols.
However, it turned out that the fact is quite opposite.
That is, we have succeed in proving that, no matter what
symmetry one imposes on the detectors, the symmetry is
never sufficient, by itself, to guarantee the existence of a
corresponding squash operator (Theorem 2).
Acknowledgments — The author would like to thank
M. Koashi and K. Tamaki for their valuable comments.
This work was supported by the National Institute of
Information and Communications Technology (NICT),
Japan.
(2008).
[8] N. J. Beaudry, T. Moroder, and N. Lütkenhaus, Phys.
Rev. Lett. 101, 093601 (2008).
[9] J. -P. Serre, Linear Representations of Finite Groups,
(Springer Verlag, New York, 1977).
[10] M. Koashi, Y. Adachi, T. Yamamoto, and N. Imoto,
arXiv:0806.0891.
[11] C. H. Bennett, G. Brassard, and N. D. Mermin, Phys.
Rev. Lett. 68, 557 (1992).
[12] M. A. Nielsen and I. L. Chuang, Quantum Computation
and Quantum Information, (Cambridge University Press,
Cambridge, 2000).
[13] A. Acin et al., Phys. Rev. Lett. 98, 230501 (2007); S.
Pironio et al., New J. Phys. 11, 045021 (2009).
[14] Squash operation is called ‘squashing model’ in [8].