Composable Security for Multipartite Entanglement Verification
- URL: http://arxiv.org/abs/2004.07679v3
- Date: Wed, 11 Nov 2020 10:43:42 GMT
- Title: Composable Security for Multipartite Entanglement Verification
- Authors: Raja Yehia, Eleni Diamanti and Iordanis Kerenidis
- Abstract summary: We present a composably secure protocol allowing $n$ parties to test an entanglement generation resource controlled by a possibly dishonest party.
The test consists only in local quantum operations and authenticated classical communication once a state is shared among them.
Our protocol can typically be used as a subroutine in a Quantum Internet, to securely share a GHZ state among the network before performing a communication or computation protocol.
- Score: 3.4806267677524896
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We present a composably secure protocol allowing $n$ parties to test an
entanglement generation resource controlled by a possibly dishonest party. The
test consists only in local quantum operations and authenticated classical
communication once a state is shared among them and provides composable
security, namely it can be used as a secure subroutine by $n$ honest parties
within larger communication protocols to test if a source is sharing quantum
states that are at least $\epsilon$-close to the GHZ state. This claim comes on
top of previous results on multipartite entanglement verification where the
security was studied in the usual game-based model. Here, we improve the
protocol to make it more suitable for practical use in a quantum network and we
study its security in the Abstract Cryptography framework to highlight
composability issues and avoid hidden assumptions. This framework is a
top-to-bottom theory that makes explicit any piece of information that each
component (party or resource) gets at every time-step of the protocol. Moreover
any security proof, which amounts to showing indistinguishability between an
ideal resource having the desired security properties (up to local simulation)
and the concrete resource representing the protocol, is composable for free in
this setting. This allows us to readily compose our basic protocol in order to
create a composably secure multi-round protocol enabling honest parties to
obtain a state close to a GHZ state or an abort signal, even in the presence of
a noisy or malicious source. Our protocol can typically be used as a subroutine
in a Quantum Internet, to securely share a GHZ state among the network before
performing a communication or computation protocol.
Related papers
- A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Experimental quantum secret sharing based on phase encoding of coherent
states [17.01107355316032]
We propose a quantum secret sharing protocol with simple phase encoding of coherent states among three parties.
Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss.
arXiv Detail & Related papers (2023-03-26T04:35:07Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Byzantine-Robust Federated Learning with Optimal Statistical Rates and
Privacy Guarantees [123.0401978870009]
We propose Byzantine-robust federated learning protocols with nearly optimal statistical rates.
We benchmark against competing protocols and show the empirical superiority of the proposed protocols.
Our protocols with bucketing can be naturally combined with privacy-guaranteeing procedures to introduce security against a semi-honest server.
arXiv Detail & Related papers (2022-05-24T04:03:07Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - Multi-party Semi-quantum Secret Sharing Protocol based on Measure-flip and Reflect Operations [1.3812010983144802]
Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations.
This paper proposes a novel SQSS protocol based on multi-particle GHZ states.
arXiv Detail & Related papers (2021-09-03T08:52:17Z) - Quantum Secure Direct Communication with Mutual Authentication using a
Single Basis [2.9542356825059715]
We propose a new theoretical scheme for quantum secure direct communication (QSDC) with user authentication.
The present protocol uses only one orthogonal basis of single-qubit states to encode the secret message.
We discuss the security of the proposed protocol against some common attacks and show that no eaves-dropper can get any information from the quantum and classical channels.
arXiv Detail & Related papers (2021-01-10T16:32:42Z) - Security Limitations of Classical-Client Delegated Quantum Computing [54.28005879611532]
A client remotely prepares a quantum state using a classical channel.
Privacy loss incurred by employing $RSP_CC$ as a sub-module is unclear.
We show that a specific $RSP_CC$ protocol can replace the quantum channel at least in some contexts.
arXiv Detail & Related papers (2020-07-03T13:15:13Z) - Client-Server Identification Protocols with Quantum PUF [1.4174475093445233]
We propose two identification protocols based on the emerging hardware secure solutions, the quantum Physical Unclonable Functions (qPUFs)
The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice-versa.
Unlike existing identification protocols based on Quantum Read-out PUFs which rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties.
arXiv Detail & Related papers (2020-06-08T12:35:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.