Sharing classical secrets with continuous-variable entanglement:
Composable security and network coding advantage
- URL: http://arxiv.org/abs/2104.10659v2
- Date: Fri, 25 Feb 2022 13:59:14 GMT
- Title: Sharing classical secrets with continuous-variable entanglement:
Composable security and network coding advantage
- Authors: Nathan Walk and Jens Eisert
- Abstract summary: We show that multi-partite entangled resources achieve a genuine advantage over point-to-point protocols for quantum communication.
This is the first concrete compelling examples of multi-partite entangled resources achieving a genuine advantage over point-to-point protocols for quantum communication.
- Score: 0.913755431537592
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Secret sharing is a multi-party cryptographic primitive that can be applied
to a network of partially distrustful parties for encrypting data that is both
sensitive (it must remain secure) and important (it must not be lost or
destroyed). When sharing classical secrets (as opposed to quantum states), one
can distinguish between protocols that leverage bi-partite quantum key
distribution (QKD) and those that exploit multi-partite entanglement. The
latter class are known to be vulnerable to so-called participant attacks and,
while progress has been made recently, there is currently no analysis that
quantifies their performance in the composable, finite-size regime which has
become the gold standard for QKD security. Given this - and the fact that
distributing multi-partite entanglement is typically challenging - one might
well ask: Is there any virtue in pursuing multi-partite entanglement based
schemes? Here, we answer this question in the affirmative for a class of secret
sharing protocols based on continuous variable graph states. We establish
security in a composable framework and identify a network topology,
specifically a bottleneck network of lossy channels, and parameter regimes
within the reach of present day experiments for which a multi-partite scheme
outperforms the corresponding QKD based method in the asymptotic and
finite-size setting. Finally, we establish experimental parameters where the
multi-partite schemes outperform any possible QKD based protocol. This one of
the first concrete compelling examples of multi-partite entangled resources
achieving a genuine advantage over point-to-point protocols for quantum
communication and represents a rigorous, operational benchmark to assess the
usefulness of such resources.
Related papers
- Experimental coherent-state quantum secret sharing with finite pulses [15.261941167557849]
Quantum secret sharing (QSS) plays a significant role in quantum communication.
We propose a three-user QSS protocol based on phase-encoding technology.
Our protocol achieves secure key rates ranging from 432 to 192 bps.
arXiv Detail & Related papers (2024-10-08T09:01:06Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Advantage of multi-partite entanglement for quantum cryptography over
long and short ranged networks [0.3683202928838613]
We show the security of a variant of the GHZ state based secret sharing protocol against general attacks.
We then identify parameters for a performance advantage over realistic bottleneck networks.
The addition of quantum repeaters unlocks the performance advantage of multi-partite entanglement over point-to-point approaches.
arXiv Detail & Related papers (2023-12-20T19:04:17Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Multi-User Entanglement Distribution in Quantum Networks Using Multipath
Routing [55.2480439325792]
We propose three protocols that increase the entanglement rate of multi-user applications by leveraging multipath routing.
The protocols are evaluated on quantum networks with NISQ constraints, including limited quantum memories and probabilistic entanglement generation.
arXiv Detail & Related papers (2023-03-06T18:06:00Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Analysis of Multiple Overlapping Paths algorithms for Secure Key
Exchange in Large-Scale Quantum Networks [0.0]
Current implementations of quantum networks are unavoidably equipped with trusted nodes.
Some new authentication and key exchange schemes must be considered to fully benefit from the unconditional security of links.
One such approach uses Multiple Non-Overlapping Paths (MNOPs) for key exchange to mitigate the risk of an attack on a trusted node.
arXiv Detail & Related papers (2022-05-06T12:40:52Z) - Numerical Method for Finite-size Security Analysis of Quantum Key
Distribution [1.2891210250935146]
We develop a finite-size security analysis against general attacks for general QKD protocols.
Our result shows that the finite-size key rate can surpass the linear key-rate bound in a realistic communication time.
arXiv Detail & Related papers (2021-11-16T09:10:56Z) - Multi-party Semi-quantum Secret Sharing Protocol based on Measure-flip and Reflect Operations [1.3812010983144802]
Semi-quantum secret sharing (SQSS) protocols serve as fundamental frameworks in quantum secure multi-party computations.
This paper proposes a novel SQSS protocol based on multi-particle GHZ states.
arXiv Detail & Related papers (2021-09-03T08:52:17Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.