# Quantifying how much quantum information can be eavesdropped

January 28, 2019Summary The most basic type of quantum information processing is quantum entanglement. In a new study published in

*EPJ B*, Zhaonan Zhang from Shaanxi Normal University, Xi'an, China, and colleagues have provided a much finer characterisation of the distributions of entanglement in multi-qubit systems than previously available. These findings can be used in quantum cryptography to estimate the quantity of information an eavesdropper can capture regarding the secret encryption key.

Encrypted communication is achieved by sending quantum information in basic units called quantum bits, or qubits. The most basic type of quantum information processing is quantum entanglement. However, this process remains poorly understood. Better controlling quantum entanglement could help to improve quantum teleportation, the development of quantum computers, and quantum cryptography. Now, a team of Chinese physicists have focused on finding ways to enhance the reliability of quantum secret sharing. In a new study published in EPJ B, Zhaonan Zhang from Shaanxi Normal University, Xi'an, China, and colleagues provide a much finer characterisation of the distributions of entanglement in multi-qubit systems than previously available. In the context of quantum cryptography, these findings can be used to estimate the quantity of information an eavesdropper can capture regarding the secret encryption key.

Physicists working on new ways of securing quantum encrypted messages are exploiting the fact that, at the quantum scale, a given qubit can only be entangled with one other qubit; this unique trait is referred to as monogamy of entanglement. In practical terms, the quantum rules for entanglement are explained by considering three qubits, called A, B and C, belonging to Alice, Bob and Charlie, respectively. If Alice and Bob share quantum information via a two-qubit system, called AB, they cannot share any entangled states with Charlie's qubit C.

However, there is also another kind of entanglement, called polygamy, in which qubits display partial entanglement with several qubits at the same time.

In this study, the authors develop a series of equations explaining the conditions for monogamy and polygamy, which are much better characterised than previous work. Specifically, they first investigate three-qubit systems under certain restrictions and then derive a general result for multi-qubit systems.

-end-

**Reference**

Z. Zhang, Y. Luo, and Y. Li (2019), Tighter monogamy and polygamy relations in multiqubit systems,

*European Physical Journal D*73: 13, DOI: 10.1140/epjd/e2018-90563-2

Springer

**Related Quantum Cryptography Articles:**

Quantum nanoscope

Researchers have studied how light can be used to 'see' the quantum nature of an electronic material.

Researchers have studied how light can be used to 'see' the quantum nature of an electronic material.

Testing quantum field theory in a quantum simulator

Quantum field theories are often hard to verify in experiments.

Quantum field theories are often hard to verify in experiments.

Looking for the quantum frontier

Researchers have developed a new theoretical framework to identify computations that occupy the 'quantum frontier' -- the boundary at which problems become impossible for today's computers and can only be solved by a quantum computer.

Researchers have developed a new theoretical framework to identify computations that occupy the 'quantum frontier' -- the boundary at which problems become impossible for today's computers and can only be solved by a quantum computer.

Seeing the quantum future... literally

Sydney scientists have demonstrated the ability to 'see' the future of quantum systems and used that knowledge to preempt their demise, in a major achievement that could help bring the strange and powerful world of quantum technology closer to reality.

Sydney scientists have demonstrated the ability to 'see' the future of quantum systems and used that knowledge to preempt their demise, in a major achievement that could help bring the strange and powerful world of quantum technology closer to reality.

New quantum states for better quantum memories

How can quantum information be stored as long as possible?

How can quantum information be stored as long as possible?

USC quantum computing researchers reduce quantum information processing errors

USC Viterbi School of Engineering scientists found a new method to reduce the heating errors that have hindered quantum computing.

USC Viterbi School of Engineering scientists found a new method to reduce the heating errors that have hindered quantum computing.

Quantum drag

An University of Iowa physicist proposes that a current in one iron magnetic sheet creates a current in a separate sheet.

An University of Iowa physicist proposes that a current in one iron magnetic sheet creates a current in a separate sheet.

Quantum satellite device tests technology for global quantum network

Researchers at the National University of Singapore and University of Strathclyde, UK, report first data from a satellite that is testing technology for a global quantum network.

Researchers at the National University of Singapore and University of Strathclyde, UK, report first data from a satellite that is testing technology for a global quantum network.

Quantum computing closer as RMIT drives towards first quantum data bus

Researchers have trialled a quantum processor capable of routing quantum information from different locations in a critical breakthrough for quantum computing.

Researchers have trialled a quantum processor capable of routing quantum information from different locations in a critical breakthrough for quantum computing.

New laser technique promises super-fast and super-secure quantum cryptography

A new method of implementing an 'unbreakable' quantum cryptographic system is able to transmit information at rates more than ten times faster than previous attempts.

A new method of implementing an 'unbreakable' quantum cryptographic system is able to transmit information at rates more than ten times faster than previous attempts.

**Related Quantum Cryptography Reading:**

## Best Science Podcasts 2019

We have hand picked the**best science podcasts**for 2019. Sit back and enjoy new science podcasts updated daily from your favorite science news services and scientists.

**Now Playing: TED Radio Hour**

**Jumpstarting Creativity**

Our greatest breakthroughs and triumphs have one thing in common: creativity. But how do you ignite it? And how do you rekindle it? This hour, TED speakers explore ideas on jumpstarting creativity. Guests include economist Tim Harford, producer Helen Marriage, artificial intelligence researcher Steve Engels, and behavioral scientist Marily Oppezzo.

**Now Playing: Science for the People**

**#524 The Human Network**

What does a network of humans look like and how does it work? How does information spread? How do decisions and opinions spread? What gets distorted as it moves through the network and why? This week we dig into the ins and outs of human networks with Matthew Jackson, Professor of Economics at Stanford University and author of the book "The Human Network: How Your Social Position Determines Your Power, Beliefs, and Behaviours".