Breaking simple quantum position verification protocols with little
entanglement
- URL: http://arxiv.org/abs/2007.15808v1
- Date: Fri, 31 Jul 2020 02:19:55 GMT
- Title: Breaking simple quantum position verification protocols with little
entanglement
- Authors: Andrea Olivo, Ulysse Chabaud, Andr\'e Chailloux, Fr\'ed\'eric
Grosshans
- Abstract summary: INQC evades apparent quantum and relativistic constraints and allows to attack generic quantum position verification protocols.
We consider adversaries sharing maximally entangled pairs of qudits and find low-dimensional INQC attacks against the simple practical family of QPV protocols.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Instantaneous nonlocal quantum computation (INQC) evades apparent quantum and
relativistic constraints and allows to attack generic quantum position
verification (QPV) protocols (aiming at securely certifying the location of a
distant prover) at an exponential entanglement cost. We consider adversaries
sharing maximally entangled pairs of qudits and find low-dimensional INQC
attacks against the simple practical family of QPV protocols based on single
photons polarized at an angle $\theta$. We find exact attacks against some
rational angles, including some sitting outside of the Clifford hierarchy (e.g.
$\pi/6$), and show no $\theta$ allows to tolerate errors higher than $\simeq
5\cdot 10^{-3}$ against adversaries holding two ebits per protocol's qubit.
Related papers
- Quantum Secure Protocols for Multiparty Computations [2.9561405287476177]
We present secure multiparty computation (MPC) protocols that can withstand quantum attacks.
We first present the design and analysis of an information-theoretic secure oblivious linear evaluation (OLE), namely $sf qOLE$ in the quantum domain.
We further utilize $sf qOLE$ as a building block to construct a quantum-safe multiparty private set intersection (MPSI) protocol.
arXiv Detail & Related papers (2023-12-26T19:53:29Z) - Making Existing Quantum Position Verification Protocols Secure Against
Arbitrary Transmission Loss [0.889974344676093]
In quantum position verification (QPV) protocols, even relatively small loss rates can compromise security.
We modify the usual structure of QPV protocols and prove that this modification makes the potentially high transmission loss between the verifiers security-irrelevant.
We show possible implementations of the required photon presence detection, making c-$mathrmQPV_mathrmBB84f$ a protocol that solves all major practical issues in QPV.
arXiv Detail & Related papers (2023-12-19T21:38:10Z) - Single-qubit loss-tolerant quantum position verification protocol secure
against entangled attackers [0.0]
We study the exact loss-tolerance of the most popular protocol for QPV, which is based on BB84 states.
We show how these results transfer to the variant protocol which combines $n$ bits of classical information with a single qubit.
arXiv Detail & Related papers (2022-12-07T14:39:56Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Secure multi-party quantum computation protocol for quantum circuits: the exploitation of triply-even quantum error-correcting codes [2.915868985330569]
MPQC protocol is a cryptographic primitive allowing error-free distributed quantum computation.
We suggest a modified MPQC protocol that adopts unconventional quantum error-correcting codes.
arXiv Detail & Related papers (2022-06-10T04:43:11Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Realization of arbitrary doubly-controlled quantum phase gates [62.997667081978825]
We introduce a high-fidelity gate set inspired by a proposal for near-term quantum advantage in optimization problems.
By orchestrating coherent, multi-level control over three transmon qutrits, we synthesize a family of deterministic, continuous-angle quantum phase gates acting in the natural three-qubit computational basis.
arXiv Detail & Related papers (2021-08-03T17:49:09Z) - Towards practical and error-robust quantum position verification [0.0]
Loss of inputs can be detrimental to the security of quantum position verification (QPV) protocols.
We propose a new fully loss-tolerant protocol QPV$_textsfSWAP$, based on the SWAP test.
We show that the protocol remains secure even if unentangled attackers are allowed to quantum communicate.
arXiv Detail & Related papers (2021-06-24T11:10:44Z) - Geometry of Banach spaces: a new route towards Position Based
Cryptography [65.51757376525798]
We study Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games.
The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol.
We show that the understanding of the type properties of some more involved Banach spaces would allow to drop out the assumptions and lead to unconditional lower bounds on the resources used to attack our protocol.
arXiv Detail & Related papers (2021-03-30T13:55:11Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.