Fault tolerant authenticated quantum dialogue using logical Bell states
- URL: http://arxiv.org/abs/2205.02419v1
- Date: Thu, 5 May 2022 03:36:41 GMT
- Title: Fault tolerant authenticated quantum dialogue using logical Bell states
- Authors: Tian-Yu Ye
- Abstract summary: Two fault tolerant authenticated quantum dialogue (AQD) protocols are proposed in this paper.
logical Bell states as the quantum resource are employed to combat the collective-dephasing noise and the collective-rotation noise.
In each of two proposed protocols, the information transmitted through the classical channel is assumed to be eavesdroppable and modifiable.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Two fault tolerant authenticated quantum dialogue (AQD) protocols are
proposed in this paper by employing logical Bell states as the quantum
resource, which combat the collective-dephasing noise and the
collective-rotation noise, respectively. The two proposed protocols each can
accomplish the mutual identity authentication and the dialogue between two
participants simultaneously and securely over one kind of collective noise
channels. In each of two proposed protocols, the information transmitted
through the classical channel is assumed to be eavesdroppable and modifiable.
The key for choosing the measurement bases of sample logical qubits is
pre-shared privately between two participants. The Bell state measurements
rather than the four-qubit joint measurements are adopted for decoding. The two
participants share the initial states of message logical Bell states with
resort to the direct transmission of auxiliary logical Bell states so that the
information leakage problem is avoided. The impersonation attack, the
man-in-the-middle attack, the modification attack and the Trojan horse attacks
from Eve all are detectable.
Related papers
- Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Semiquantum private comparison based on Bell states without quantum measurements from the classical user [4.4053348026380235]
We propose a novel semiquantum private comparison protocol based on Bell states.
TP is assumed to be semi-honest in the sense that she may take all possible attacks to steal users' private inputs except conspiring with anyone.
Our protocol can take advantage over previous SQPC protocols based on Bell states in qubit efficiency.
arXiv Detail & Related papers (2022-05-10T14:32:53Z) - Multi-party Quantum Private Comparison Protocol Based on Entanglement
Swapping of Bell Entangled States [0.0]
In this paper, we put forward a three-party quantum private comparison protocol based on entanglement swapping of Bell entangled state.
We generalize the three-party protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among users within one execution.
arXiv Detail & Related papers (2022-05-09T02:28:13Z) - Fault tolerant channel-encrypting quantum dialogue against collective
noise [0.0]
Two fault tolerant channel-encrypting quantum dialogue protocols against collective noise are presented.
One is against collective-dephasing noise, while the other is against collective-rotation noise.
Einstein-Podolsky-Rosen pairs, which play the role of private quantum key, are securely shared between two participants.
arXiv Detail & Related papers (2022-05-05T02:56:29Z) - Information leakage resistant quantum dialogue against collective noise [0.0]
Two information leakage resistant quantum dialogue (QD) protocols over a collective-noise channel are proposed.
Two secret messages are encoded on the initial logical qubits via two unitary operations.
detailed security analysis shows that Eve's several famous active attacks can be effectively overcome.
arXiv Detail & Related papers (2022-05-05T02:23:47Z) - Quantum dialogue without information leakage based on the entanglement
swapping between any two Bell states and the shared secret Bell state [0.0]
The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together.
Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve.
arXiv Detail & Related papers (2022-05-04T03:52:51Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.