Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more
- URL: http://arxiv.org/abs/2201.13445v2
- Date: Tue, 6 Sep 2022 15:57:51 GMT
- Title: Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more
- Authors: Alexandru Gheorghiu, Tony Metger, Alexander Poremba
- Abstract summary: Many cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob.
We show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem.
This means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical.
- Score: 125.99533416395765
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum mechanical effects have enabled the construction of cryptographic
primitives that are impossible classically. For example, quantum
copy-protection allows for a program to be encoded in a quantum state in such a
way that the program can be evaluated, but not copied. Many of these
cryptographic primitives are two-party protocols, where one party, Bob, has
full quantum computational capabilities, and the other party, Alice, is only
required to send random BB84 states to Bob. In this work, we show how such
protocols can generically be converted to ones where Alice is fully classical,
assuming that Bob cannot efficiently solve the LWE problem. In particular, this
means that all communication between (classical) Alice and (quantum) Bob is
classical, yet they can still make use of cryptographic primitives that would
be impossible if both parties were classical. We apply this conversion
procedure to obtain quantum cryptographic protocols with classical
communication for unclonable encryption, copy-protection, computing on
encrypted data, and verifiable blind delegated computation. The key technical
ingredient for our result is a protocol for classically-instructed parallel
remote state preparation of BB84 states. This is a multi-round protocol between
(classical) Alice and (quantum polynomial-time) Bob that allows Alice to
certify that Bob must have prepared $n$ uniformly random BB84 states (up to a
change of basis on his space). Furthermore, Alice knows which specific BB84
states Bob has prepared, while Bob himself does not. Hence, the situation at
the end of this protocol is (almost) equivalent to one where Alice sent $n$
random BB84 states to Bob. This allows us to replace the step of preparing and
sending BB84 states in existing protocols by our remote-state preparation
protocol in a generic and modular way.
Related papers
- Quantum advantage in a unified scenario and secure detection of
resources [55.2480439325792]
We consider a single task to study different approaches of having quantum advantage.
We show that the optimal success probability in the overall process for a qubit communication might be higher than that for a cbit communication.
arXiv Detail & Related papers (2023-09-22T23:06:20Z) - Non-interactive XOR quantum oblivious transfer: optimal protocols and
their experimental implementations [0.0]
Oblivious transfer (OT) is an important cryptographic primitive.
We present an optimal protocol, which outperforms classical protocols.
We optically implement both the unreversed and the reversed protocols, and cheating strategies, noting that the reversed protocol is easier to implement.
arXiv Detail & Related papers (2022-09-22T20:28:39Z) - Two quantum algorithms for communication between spacelike separated
locations [0.7614628596146599]
We argue that superluminal communication is possible through state discrimination in a higher-dimensional Hilbert space using ancilla qubits.
We propose two quantum algorithms through state discrimantion for communication between two observers Alice and Bob.
arXiv Detail & Related papers (2022-09-16T06:54:22Z) - Proofs of Quantumness from Trapdoor Permutations [9.767030279324038]
Alice and Bob communicate over only classical channels.
Alice can do only classical probabilistic-time computing.
Bob can be constructed from classically-secure (full-domain) trapdoor permutations.
arXiv Detail & Related papers (2022-08-26T01:11:05Z) - Quantum secure direct communication with private dense coding using
general preshared quantum state [59.99354397281036]
We study secure direct communication by using a general preshared quantum state and a generalization of dense coding.
For a practical application, we propose a concrete protocol and derive an upper bound of information leakage.
arXiv Detail & Related papers (2021-12-30T16:12:07Z) - Counterfactual Concealed Telecomputation [22.577469136318836]
We devise a distributed blind quantum computation protocol to perform a universal two-qubit controlled unitary operation.
It is shown that the protocol is valid for general input states and that single-qubit unitary teleportation is a special case of CCT.
The protocol becomes deterministic with simplified circuit implementation if the initial composite state of Alice and Bob is a Bell-type state.
arXiv Detail & Related papers (2020-12-09T10:07:58Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Gaussian conversion protocols for cubic phase state generation [104.23865519192793]
Universal quantum computing with continuous variables requires non-Gaussian resources.
The cubic phase state is a non-Gaussian state whose experimental implementation has so far remained elusive.
We introduce two protocols that allow for the conversion of a non-Gaussian state to a cubic phase state.
arXiv Detail & Related papers (2020-07-07T09:19:49Z) - A device-independent protocol for XOR oblivious transfer [0.0]
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them.
In this work we give a fully device-independent quantum protocol for XOR oblivious transfer.
arXiv Detail & Related papers (2020-06-11T17:59:46Z) - Quantum Gram-Schmidt Processes and Their Application to Efficient State
Read-out for Quantum Algorithms [87.04438831673063]
We present an efficient read-out protocol that yields the classical vector form of the generated state.
Our protocol suits the case that the output state lies in the row space of the input matrix.
One of our technical tools is an efficient quantum algorithm for performing the Gram-Schmidt orthonormal procedure.
arXiv Detail & Related papers (2020-04-14T11:05:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.