1 Introduction

Quantum cryptography [1] has been the first application of quantum mechanics at the single quantum level [2]. Based on the laws of quantum mechanic physics, unconditional security is provided by quantum cryptograph, which performs better than classical cryptograph [3]. And the estimation of physical parameters and the improvement in measurement precision by employing quantum mechanics (quantum metrology) have attracted considerable attention [4,5,6,7,8,9,10].

In Ref. [11], Giovannetti et al. detail a scheme that employs entanglement and squeezing to achieve a higher accuracy and cryptographic capabilities in position measurement, which do not allow an eavesdropper to obtain information on the position of Alice. And in Ref. [12] they overcome the primary drawbacks of this scheme, which are the difficulty of creating the requisite entanglement and the sensitivity to loss. In Ref. [13], they present a protocol that, using the frequency-entangled state at the output of a parametric down conversion crystal, allows one to perform quantum crypto-positioning. In Ref. [14], Chiribella et al. give a simple protocol that needs no entanglement and an entangled protocol that achieves the ultimate bounds in the precision of reference frame transmission.

Recently, Huang et al. [15] introduce a work for quantum cryptographic protocols specifically suited to the task of securing measurement outcomes (parameter estimation) with a two-dimensional system. In this article, we consider a new cryptographic quantum metrology with a high-dimensional probe system. Our quantum cryptographic protocol can perform better with the same number of probes than the one in [15]. It is because that utilizing high-dimensional probes need not decoy states to detect Eve. For a single parameter, the information of parameter is randomly encoded into any two dimensions of a multi-dimensional probe. Due to the indistinguishable encoded states of probes from Alice, Eve cannot obtain the detail input states. We analyze the security and prove that Eve cannot obtain the information of parameter without having been detected. Even though Eve does not worry to be detected, she still cannot obtain the information of parameter due to that Alice does not tell Bob the information of prepared states with the classical communication after detecting Eve. Finally, we generalize it to cryptographic quantum multi-parameter estimation.

The rest of this article is arranged as follows. In Sect. 2, we briefly introduce the quantum metrology of single parameter and multi-parameter, and the formula of Fisher information. In Sect. 3, we detail the cryptographic quantum metrology protocol of a single parameter and show its security. Then, we generalize it to multi-parameter cryptographic quantum metrology protocol in Sect. 4. A conclusion and outlook are presented in Sect. 5.

2 Review of quantum metrology

Quantum metrology is a fundamental subject concerning the estimation of parameters under the constraints of quantum dynamics [7]. The famous Cramér–Rao bound [16, 17] offers a very good parameter estimation under the constraints of quantum physics:

$$\begin{aligned} (\delta x)^2\ge \frac{1}{N\mathcal {F}_Q[\hat{\rho }(x)]}, \end{aligned}$$
(1)

where N represents the total number of experiments. \(\mathcal {F}_Q[\hat{\rho }(x)]\) denotes quantum Fisher information (QFI), which can be generalized from classical Fisher information. The classical Fisher information is defined by

$$\begin{aligned} f(x)=\sum _k p_k(x)[d\ln [p_k(x)]/dx]^2, \end{aligned}$$
(2)

where \(p_k(x)\) is the probability of obtaining the set of experimental results k for the parameter value x. Furthermore, the QFI is given by the maximum of the Fisher information over all measurement strategies allowed by quantum physics:

$$\begin{aligned} \mathcal {F}_{Q}[\hat{\rho }(x)]=\max _{\{\hat{E}_k\}}f[\hat{\rho }(x);\{\hat{E}_k\}], \end{aligned}$$
(3)

where positive operator-valued measure \(\{\hat{E}_k\}\) represents a specific measurement device. If the probe state is pure, \(\hat{\rho }_S(x)=|\psi (x)\rangle \langle \psi (x)|\), the corresponding expression of QFI is

$$\begin{aligned} \mathcal {F}_{Q}[\hat{\rho }(x)]=4 \left[ \frac{d\langle \psi (x)|}{dx}\frac{d|\psi (x)\rangle }{dx} -\left| \frac{d\langle \psi (x)|}{dx}\right| \psi (x)\rangle |^2\right] . \end{aligned}$$
(4)

For the classical multi-parameter Cramér–Rao bound [6]:

$$\begin{aligned} \text {Cov}(\widetilde{\mathbf{x }})\ge F^{-1}, \end{aligned}$$
(5)

where \(\mathbf x =\{x_1,x_2, \ldots , x_m\}\), \(\text {Cov}(\widetilde{\mathbf{x }})\) refers to the covariance matrix for a locally unbiased estimator \(\widetilde{\mathbf{x }}(k)\), \(\text {Cov}(\widetilde{\mathbf{x }})_{jk}=\langle (\widetilde{x}_j-x_j)(\widetilde{x}_k-x_k)\rangle \), and \(\langle .\rangle \) represents the average with respect to the probability distribution \(p_k(\mathbf x )\). The classic Fisher matrix for m parameters is the \(m\times m\) matrix with entries given by

$$\begin{aligned} F_{jk}=\sum _i p_k(x)\left( \frac{\partial \ln [p_i(x)]}{\partial x_j}\right) \left( \frac{\partial \ln [p_i(x)]}{\partial x_k}\right) . \end{aligned}$$
(6)

3 Cryptographic quantum metrology protocol of single parameter

The task of cryptographic quantum metrology is that Alice sends a d (\(d\ge 3\)) dimension probe encoded with an unknown single parameter \(\varphi \) to Bob, and then Bob obtains the parameter by measurement. The Hilbert space of a probe can be expressed by (\(|1\rangle , |2\rangle , \ldots ,|d\rangle \)). The parameter \(\varphi \) is encoded into any two levels by a unitary map \(U(\varphi )\). When Alice prepares state \(\frac{\sqrt{2}}{2}(|j\rangle +|k\rangle )\) (\(j<k\) and \(j, k=1, 2, \ldots , n\)), after the unitary map the encoded state is described by \(\frac{\sqrt{2}}{2}(e^{-i\varphi /2}|j\rangle +e^{i\varphi /2}|k\rangle )\). For different prepared state, different unitary map is required. After repeating \(\nu \) times estimation procedure, the precision can be obtained by Eq. (4)

$$\begin{aligned} \delta \varphi \ge 1/\sqrt{\nu }. \end{aligned}$$
(7)

In order to improve the precision of parameter, parallel-entangled strategy and sequential strategy [15] can improve the precision to the Heisenberg limit. For the parallel-entangled strategy, the encoded state of \(n \) probes is \(\frac{\sqrt{2}}{2}(e^{-i n\varphi /2}|j\rangle ^{\bigotimes n}+e^{i n\varphi /2}|k\rangle ^{\bigotimes n})\). For sequential strategy, after \(n \) times unitary maps the encoded state is \(\frac{\sqrt{2}}{2}(e^{-i n\varphi /2}|j\rangle +e^{i n\varphi /2}|k\rangle )\). The corresponding precisions for two strategies are same, which is given by

$$\begin{aligned} \delta \varphi \ge 1/(n\sqrt{\nu }). \end{aligned}$$
(8)

Next, we consider transforming the metrology protocols into quantum cryptographically secure ones with two strategies.

Sequential strategy Firstly, for sequential strategy, cryptographical quantum metrology protocol of a single parameter can be described by the following six steps:

  1. 1.

    Alice randomly prepares state \(\frac{\sqrt{2}}{2}(|j\rangle \pm |k\rangle )\), in which, \(j\ne k\ , j,\ k=1, 2, \ldots , d\) and the operations “+” and “-” are also chosen uniformly at random.

  2. 2.

    Alice sequentially uses n times unitary map channel to encode the information of parameter \(\varphi \) and, hence, obtains state \(\frac{\sqrt{2}}{2}(e^{-i n\varphi /2}|j\rangle \pm e^{i n\varphi /2}|k\rangle )\).

  3. 3.

    After Bob receives the encoded state from Alice (Alice determines that Bob has received the encoded state by classical communication), Alice tells Bob the measurement operators by classical communication, where the measurement operator can be described by POVM formalism (positive operator-valued measure) [18],

    $$\begin{aligned}&\left\{ E_1=\frac{1}{2}(|j\rangle +|k\rangle )(\langle j|+\langle k|),\ E_2=\frac{1}{2}(|j\rangle -|k\rangle )(\langle j|-\langle k|),\right. \nonumber \\&\left. E_3=1-|j\rangle \langle j|-|k\rangle \langle k|\right\} . \end{aligned}$$
    (9)
  4. 4.

    Bob tells Alice the measurement results. If Bob obtains the result \(E_3\), the protocol is aborted due to that the parameter has been eavesdropped by Eve.

  5. 5.

    Repeat the above four steps \(\nu \) times.

  6. 6.

    Alice tells Bob the prepared states in order.

    Then, Bob can obtain the information parameter and estimate the precision.

Then, we show that it is unconditionally secure from two cases as following: first case, Eve cannot let Bob obtain the wrong information of parameter \(\varphi \) without being detected; second case, Eve cannot eavesdrop the information of parameter \(\varphi \).

First case—If Eve just want to let Bob obtain the wrong information of \(\varphi \) without being detected, she can introduce additional \(\Delta \varphi \) on the probe to bias Bobs estimation results. Due to that, Eve does not know which subspace (\(|j\rangle \), \(|k\rangle \)) is chosen each time by Alice to prepare the probe, so it is impossible to induce the same additional \(\Delta \varphi \) on different encoded states. When Eve let the encoded probes go through a fixed channel, different additional \(\Delta \varphi \) is encoded into different input probes. As a result, Bob receives the state \(\frac{\sqrt{2}}{2}(e^{-i (n\varphi /2+\Delta \varphi _{jk})/2}|j\rangle \pm e^{i( n\varphi /2+\Delta \varphi _{jk})/2}|k\rangle )\). Then, Bob obtains different parameter value of \(\varphi \) by the measurement probability. So Eve will be detected. Eve need to randomly introduce different additional \(\Delta \varphi _{jk}\), and the expectation value of \(\Delta \varphi _{jk}\) should be same \(\langle \Delta \varphi _{jk}\rangle =\Delta \) for different values of (j,k). And we note that \(\Delta \varphi _{jk}=-\Delta \varphi _{kj}\). It can be proved easily. For example, Eve uses a Hamiltonian H to induce the additional phase. And (\(|j\rangle \), \(|k\rangle \)) should be the eigenvectors of H. Otherwise, it is impossible to obtain the state \(\frac{\sqrt{2}}{2}(e^{-i (n\varphi /2+\Delta \varphi _{jk})/2}|j\rangle \pm e^{i( n\varphi /2+\Delta \varphi _{jk})/2}|k\rangle )\). Then, \(\Delta \varphi _{jk}=(H_j-H_k)t\), where \(H_j\) denotes the jth eigenvalue of H. So \(\Delta \varphi _{jk}=-\Delta \varphi _{kj}\); namely, the expectation value of \(\langle \Delta \varphi _{jk}\rangle =-\langle \Delta \varphi _{jk}\rangle \). So \(\Delta \) has to be 0. Therefore, Bob still obtains the value of parameter \(\varphi \) without a bias. Eve only reduces the precision. We consider that the probability distribution of \(\Delta \varphi _{jk}\) is the Gaussian distribution \(\frac{1}{\sqrt{2\pi }\delta }\exp [-\frac{(\Delta \varphi _{jk})^2}{2\delta ^2}]\). The probability of result \(E_1\) (\(E_2\)) is given by P (1-P),

$$\begin{aligned} P=\frac{1+\cos (n \varphi ) e^{-\delta ^2/2}}{2}. \end{aligned}$$
(10)

Substituting it into Eq. (6), the precision can be given by

$$\begin{aligned} \delta \varphi \ge \frac{\sqrt{1-\cos ^2 (n\varphi ) e^{-\delta ^2}}}{n\sqrt{\nu \sin ^2 (n\varphi )e^{-\delta ^2}}}. \end{aligned}$$
(11)

Obviously, the precision of \(\delta \varphi \) is reduced. For \(\varphi \ne N \pi \) ( \(N=0,\pm 1,\pm 2,\ldots \)), the influence of Eve can be neglected by enhancing the repeat count \(\nu \) and n. However, for \(\varphi = N \pi \), the influence of Eve cannot be reduced. Then, Bob gives up the result. Then, they perform the cryptographical quantum metrology protocol again, but Bob measures the encoded state with a new measurement operator in the third step

$$\begin{aligned}&\left\{ E_1=\frac{1}{2}(e^{-i\pi /4}|j\rangle +e^{i\pi /4}|k\rangle ) (e^{-i\pi /4}\langle j|+e^{i\pi /4}\langle k|),\right. \nonumber \\&E_2=\frac{1}{2}(e^{-i\pi /4}|j\rangle -e^{i\pi /4}|k\rangle )(e^{-i\pi /4}\langle j|-e^{i\pi /4}\langle k|),\nonumber \\&\left. \quad E_3=1-|j\rangle \langle j|-|k\rangle \langle k|\right\} . \end{aligned}$$
(12)

In this way, Bob can obtain the parameter \(\varphi \) with a high precision for \(\varphi = N \pi \),

$$\begin{aligned} \delta \varphi \ge \frac{\sqrt{1- e^{-\delta ^2}}}{n\sqrt{\nu e^{-\delta ^2}}}. \end{aligned}$$
(13)

Second case—Even though Eve does not worry to be detected, she cannot obtain the information of parameter \(\varphi \) from the decoded states, because, after Eve is detected, she does not know the prepared states belonging to which one of \(\frac{\sqrt{2}}{2}(|j\rangle +|k\rangle )\) and \(\frac{\sqrt{2}}{2}(|j\rangle -|k\rangle )\). As a result, the probability of obtaining the results \(E_1\) and \(E_2\) is same, so that it is impossible to obtain the information of parameter. In order to obtain the information, Eve need to conceal herself. After Eve intercepts the encoded states, she has to send destroyed or forged states to Bob. Eve can try to eavesdrop the information by the following two ways.

First way, Eve does not perform a measurement on the encoded state before sending a state to Bob. Eve randomly sends a state from the set \(\{\frac{\sqrt{2}}{2}(|j'\rangle \pm |k'\rangle )\), in which, \(j'\ne k'\) and \(j', k'=1, 2, \ldots , d\}\). She can successfully conceal herself with the probability \((\frac{2}{d})^\nu \). For large dimension d and repeat count \(\nu \), Eve will be detected with the probability close to 1. If Eve sends the state \(\frac{1}{\sqrt{d}}(|1\rangle +|2\rangle +,\ldots ,+|d\rangle )\), she can conceal herself with probability \((\frac{2}{d})^\nu \). The successful probability is still close to 0. So, it is impossible to conceal herself without measurement on the encoded states in advance.

Second way, Eve performs a measurement on the encoded states and then sends a state to Bob. At this point, Eve does not know the measurement operator as shown in Eq. (9).

If Eve chooses a projective measurement, which is given by

$$\begin{aligned} P_k=|k\rangle \langle k|,\ \text {in which},\ k=1, 2,\ldots ,d, \end{aligned}$$
(14)

then Eve sends the projective state \(|k'\rangle \) to Bob. By this measurement operator, Eve obtains nothing about the parameter \(\varphi \). Bob cannot detect Eve directly in the above process. However, Bob can find that the probability of results \(E_1\) and \(E_2\) is same, so Bob needs to give up the result. If Eve just wants to let Bob achieve the wrong information of parameter \(\varphi \), she can measure a part of encoded state. This will reduce the precision of estimating parameter \(\varphi \). When Eve randomly measures m encoded states. The final precision of parameter is achieved by Bob, which is given by

$$\begin{aligned} \delta \varphi \ge \frac{\sqrt{1-(1-m/\nu )^2\cos ^2 (n\varphi )}}{n(\nu -m)|\sin (n\varphi )|}. \end{aligned}$$
(15)

For \(\varphi \ne N \pi \) ( \(N=0,\pm 1,\pm 2,\ldots \)), the influence of Eve can be neglected by enhancing the repeat count \(\nu \) to be much larger than m. However, for \(\varphi = N \pi \), the influence of Eve can be very large. So, when Bob achieves the value of parameter \(\varphi = N \pi \), Bob should not trust the result. Then, they perform the cryptographical quantum metrology protocol again like the above way, and Bob measures the encoded state with the measurement operator in Eq. (12).

If Eve sends a superposition state \(|k'\rangle +e^{i\theta }|k''\rangle \), where \(k'\) is the measurement result, \(k''\ne k'\) is randomly chosen from 1 to d, and \(\theta \) is a random phase factor, Eve can conceal herself with probability \((\frac{d+1}{2d})^\nu \). For a large repeat count \(\nu \), Eve can be detected with the probability of 1.

In order to obtain the information of parameter, Eve maybe use POVM

$$\begin{aligned} P_{jk}= & {} \frac{1}{2d-2}(|j\rangle +|k\rangle )(\langle j|+\langle k|),\nonumber \\&\text {in which},\ j<k=1, 2,\ldots ,d,\ P_0=1-\sum _{j<k} P_{jk}. \end{aligned}$$
(16)

Eve can conceal herself with the probability

$$\begin{aligned} \left\{ \frac{1}{2}+\frac{3}{4(d-1)}+\left[ \frac{1}{2}-\frac{3}{4(d-1)}\right] \frac{2d-1}{d(d-1)}\right\} ^\nu . \end{aligned}$$
(17)

For \(\nu \gg 1\), Eve must be detected. So it is very secure. If Bob does not reveal Eve, Eve can obtain the information with the precision

$$\begin{aligned} \delta \varphi \ge \sqrt{\frac{8[d-1-\cos ^2(n\varphi /2)]\cos ^2(\frac{n\varphi }{2})}{\nu n^2\sin ^2(n \varphi )}}. \end{aligned}$$
(18)

For high dimension d, Eve only achieves a very low precision of parameter.

Besides the above two measurement ways, Eve can also use other measurements. However, due to the indistinguishable states (non-orthogonal states) prepared by Alice, Eve must be detected no matter which measurement is chosen.

In one word, our cryptographical quantum metrology protocol is secure. Bob will not obtain the wrong information of parameter, and the information of parameter cannot be eavesdropped by Eve.

Parallel-entangled strategy—Entangled states can also help to enhance the parameter estimation in quantum metrology [19, 20]. The corresponding cryptographical quantum metrology protocol of a single parameter can be modified as follows:

  1. 1.

    Alice randomly prepares state of n probes \(\frac{\sqrt{2}}{2}(|j\rangle ^{\otimes n}\pm |k\rangle ^{\otimes n}), \text {in which}, j<k,\ j, k=1, 2, \ldots , d\), and the operations“+” and “-” are also chosen uniformly at random.

  2. 2.

    Alice simultaneously uses n unitary map channels to encode the information of parameter \(\varphi \) and, hence, obtains state \(\frac{\sqrt{2}}{2}(e^{-i n\varphi /2}|j\rangle ^{\otimes n}\pm e^{i n\varphi /2}|k\rangle ^{\otimes n}\)).

  3. 3.

    After Bob receives the encoded state from Alice, Alice tells Bob the measurement operators by classical communication, where the measurement operator can be described by POVM formalism,

    $$\begin{aligned}&\left\{ E_1=\frac{1}{2}(|j\rangle ^{\otimes n}+|k\rangle ^{\otimes n})(\langle j|^{\otimes n}+\langle k|^{\otimes n}),\right. \nonumber \\&\left. \quad E_2=\frac{1}{2}(|j\rangle ^{\otimes n}-|k\rangle ^{\otimes n})(\langle j|^{\otimes n}-\langle k|^{\otimes n}),\ E_3=1-E_1-E_2\right\} . \end{aligned}$$
    (19)
  4. 4.

    Bob tells Alice the measurement results. If Bob obtains the result \(E_3\), the protocol is aborted due to that the parameter is eavesdropped by Eve.

  5. 5.

    Repeat the above four steps \(\nu \) times.

  6. 6.

    Alice tells Bob the prepared states in order.

    Then, Bob can obtain the information parameter and estimate the precision.

It is also secure like the case of sequential strategy due to the indistinguishable prepared states; namely, entangled states can also realize the cryptographical quantum metrology with high precision.

4 Cryptographic quantum metrology protocol of multi-parameter

Recently, multi-parameter metrology has attracted a lot of attention [21,22,23,24,25]. Simultaneous estimation of multi-parameter can perform better than estimating each parameter independently. We generalize the above cryptographic quantum metrology protocol of a single parameter to the case of multi-parameter. We consider that Alice wants to send m parameters to Bob securely.

The cryptographic quantum metrology protocol of m parameters can be summed up as follows:

  1. 1.

    Alice randomly prepares state

    $$\begin{aligned} \frac{1}{\sqrt{m+1}}(|k_0\rangle \pm |k_1\rangle \pm |k_2\rangle \pm \ldots \pm |k_m\rangle ), \end{aligned}$$
    (20)

    in which, \(\{k_a,\ k_b=1, 2, \ldots , d\}, \{a, b=0,1,2,\ldots , m\},\ d>m+1,\ \text {and}\ k_a\ne k_b\ \text {for }\ a\ne b\).

  2. 2.

    Alice sequentially uses n times unitary operators \(U(\varphi _1)\) to encode the information of parameter \(\varphi _1\); according to this way, Alice encodes all parameters \(\{\varphi _1,\varphi _2,\ldots ,\varphi _n\}\) on the prepared state and, hence, obtains the state \(\frac{1}{\sqrt{m+1}}(|k_0\rangle \pm e^{in\varphi _1}|k_1\rangle \pm e^{in\varphi _2}|k_2\rangle \pm \ldots \pm e^{i n\varphi _m}|k_m\rangle \).

  3. 3.

    After Bob receives the encoded state from Alice, Alice tells Bob the measurement operators by classical communication, where the measurement operator can be described by POVM formalism

    $$\begin{aligned}&\left\{ E_{1\pm }= \frac{1}{2}\left( \frac{1}{\sqrt{n}}|k_0\rangle \pm |k_1\rangle \right) \left( \frac{1}{\sqrt{n}}\langle k_0|\pm \langle k_1|\right) ,\right. \nonumber \\&E_{2\pm }=\frac{1}{2} \left( \frac{1}{\sqrt{n}}|k_0\rangle \pm |k_2\rangle \right) \left( \frac{1}{\sqrt{n}}\langle k_0|\pm \langle k_2|\right) ,\nonumber \\&\ldots ,\ E_{m\pm }=\frac{1}{2} \left( \frac{1}{\sqrt{n}}|k_0\rangle \pm |k_m\rangle \right) \left( \frac{1}{\sqrt{n}}\langle k_0|\pm \langle k_m|\right) ,\nonumber \\&\left. E_{m+1}=1-E_{1+}-E_{1-}-\ldots -E_{m+}-E_{m-}\right\} . \end{aligned}$$
    (21)
  4. 4.

    Bob tells Alice the measurement result. If Bob obtains the result \(E_{m+1}\), the protocol is aborted due to that the parameter is eavesdropped by Eve.

  5. 5.

    Repeat the above four steps \(\nu \) times.

  6. 6.

    Alice tells Bob the prepared states in order.

    Then, Bob can obtain the information of m parameter by calculating the probability and estimate the precision.

When the protocol can perform without being aborted due to Eve, the probability of measurement result for \(E_{j\pm }\) is given by \(P_{j\pm }=\frac{1}{2m+2}[\frac{1}{m}+1\pm \frac{2}{\sqrt{m}}\cos [2n\varphi _j]]\), with \(j=1,2,\ldots ,m\). The precision of m parameters can be obtained by Eqs. (5) and (6)

$$\begin{aligned} \delta \varphi _j\ge \sqrt{\frac{(m+1)^2-4m\cos ^2(2n\varphi _j)}{\nu n^2\sin ^2\varphi _j}}. \end{aligned}$$
(22)

Like the case of a single parameter, Eve cannot eavesdrop the information of m parameters based on the undistinguished prepared states.

5 Conclusion and outlook

The cryptographic quantum metrology of a single parameter with a high-dimensional system is studied. The high-dimensional system can satisfy the security by preparing the indistinguishable states. Decoy state is not necessary to detect Eve for our protocol. We analyze the security and show that it is absolutely secure for a large repeat count. And parallel-entangled strategy and sequential strategy can be utilized to improve the parameter precision. We also utilize the techniques of multi-parameter quantum metrology and quantum cryptography to obtain the cryptographic quantum metrology protocol of multi-parameter.

In this article, we only consider the unitary parameters. Cryptographic quantum metrology protocol of the non-unitary parameters [26, 27] will worth to be the further exploration. And a lossy channel and imperfect measurement in cryptographic quantum metrology also will be researched.