classical counterparts, as in the case of Shor’s quan-
tum algorithms for factoring integers and computing
discrete logarithms (Shor, 1997). We show herein that
the QFT and its inverse can also be successfully used
to build quantum key distribution protocols that offer
improved eavesdropping detection rates while max-
imizing the eavesdropper’s uncertainty about the bi-
nary sequence transmitted.
The QFT is a linear operator whose action on any
of the computational basis vectors |0i,|1i,···, |2
n
−1i
associated with an n-qubit register is described by the
following transformation:
|ji −→
1
√
2
n
2
n
−1
∑
k=0
e
2πijk/2
n
|ki, 0 ≤ j ≤2
n
−1. (1)
Equation (1) can be rewritten as a tensor product of
the n qubits involved, as follows:
|j
1
j
2
··· j
n
i −→
(|0i+e
2πi0. j
n
|1i) ⊗···⊗(|0i+ e
2πi0. j
1
j
2
···j
n
|1i)
2
n/2
.
(2)
Equation (2) provides the blueprint for devising a cir-
cuit implementing the QFT that requires only Θ(n
2
)
elementary quantum gates (see Figure 2).
In the case of each qubit, the 0 or π phase in-
duced by its own binary value is implemented through
a Hadamard gate. The dependency on the previous
qubits is reflected in the use of controlled phase shifts,
as depicted in Figure 2. Reversing each gate in Fig-
ure 2 gives us an efficient quantum circuit for per-
forming the inverse Fourier transform.
Because of the interdependencies introduced by
the controlled rotations, the procedure must start by
computing |j
n
i and then work its way up to |j
1
i. The
value of |j
n
i is needed in the computation of |j
n−1
i.
Both |j
n
i and |j
n−1
i are required in order to obtain
|j
n−2
i. This continues in the same manner, until fi-
nally, the values of all the higher rank bits are used to
determine |j
1
i precisely.
This fixed order of execution can be exploited to
design secure QKD schemes. The protocol that we
describe in the following can be seen as a general-
ization of the random π/2 phase shift protocol, both
relying on encapsulating information in the relative
phase between the two components in a superposi-
tion. However, the Fourier transform brings into play
the rank of a qubit in the sequence, thus giving a con-
text to each qubit transmitted.
Employing the Fourier transform instead of the ran-
dom π/2 phase shift as the encryption method does
not alter the main structure of the protocol, so we will
just point out the differences relative to the descrip-
tion we provided in the previous section. Figure 3
gives a pictorial representation of the entire protocol,
with time flowing downwards.
In step 2 of the quantum communication stage, Al-
ice applies the QFT to the binary sequence generated
in the previous step, by passing it through the quan-
tum circuit depicted in Figure 2. Then, she scrambles
the resulting qubit sequence by choosing an arbitrary
permutation of the qubits and sends them to Bob.
In the second stage of the protocol (involvingclas-
sical communication), Alice informs Bob of the cor-
rect order in which he must place the received qubits
(in other words, the rank of each qubit is disclosed).
Consequently,the raw keyextraction step can proceed
with Bob applying the inverse Fourier transform to
the properly re-arranged qubit sequence. In the ab-
sence of any eavesdropping or transmission errors,
Bob must end up with the same bit sequence that Al-
ice randomly produced at the outset of the protocol.
When Eve decides to spy on an arbitrary qubit in
the sequence, she doesn’t know its rank and is there-
fore ignorant of the influence exerted on it by the pre-
vious qubits in the ordered sequence. Without ac-
cess to this additional information (the qubit’s con-
text), Eve can have no confidencein the outcome of an
eventual measurement in the Hadamard basis pointing
to a 0 or a 1.
3.1 An Example
Suppose that the bit string that Alice wants to convey
to Bob is 10011010, so that j
1
= 1 and j
8
= 0. Con-
sider what happens if Eve intercepts the qubit of rank
6 and measures it in the Hadamard basis. Since its
state is
|0i+ e
2πi0.010
|1i = |0i+ e
π
2
i
|1i, (3)
exactly halfway between |0i and |1i (relative phase
π/2), there is an equal probability for either outcome
to be realized. Consequently, even after learning its
context, Eve’s uncertainty over this bit is total. Fol-
lowing her measurement, Eve can either send H|0i or
H|1i to Bob. In any case, Bob will undo the π/2 rota-
tion supposedly caused by j
7
= 1, therefore having a
50% chance of detecting Eve, provided he and Alice
choose to test bit j
6
. But if Bob measures bit j
6
as 1,
then the error introduced by Eve’s action is still de-
tectable, even if the qubit whose state she disturbed is
not checked by Alice and Bob. Thus, when applying
the inverse Fourier transform on the qubit of rank 5,
its quantum state becomes
|0i+ e
(π+
π
4
−
π
4
−
π
2
)i
|1i (4)
and in 50% of the cases Alice and Bob will discover
a mismatch in their values for this bit. An erroneous
KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM
265