Private network parameter estimation with quantum sensors
- URL: http://arxiv.org/abs/2207.14450v1
- Date: Fri, 29 Jul 2022 03:07:17 GMT
- Title: Private network parameter estimation with quantum sensors
- Authors: Nathan Shettell, Majid Hassani, Damian Markham
- Abstract summary: We introduce a protocol to securely evaluate linear functions of parameters over a network of quantum sensors.
This has application to secure networks of clocks and opens the door to more general applications of secure multiparty computing.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Networks of quantum sensors are a central application of burgeoning quantum
networks. A key question for the use of such networks will be their security,
particularly against malicious participants of the network. We introduce a
protocol to securely evaluate linear functions of parameters over a network of
quantum sensors, ensuring that all parties only have access to the function
value, and no access to the individual parameters. This has application to
secure networks of clocks and opens the door to more general applications of
secure multiparty computing to networks of quantum sensors.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Measurement-Device-Independent Quantum Secret Sharing Networks with Linear Bell-State Analysis [7.497434328497198]
Quantum secret sharing (QSS) plays a pivotal role in multiparty quantum communication.
However, the security of QSS schemes can be compromised by attacks exploiting imperfections in measurement devices.
Here, we propose a reconfigurable approach to implement QSS based on measurement-device-independent (MDI) principles.
arXiv Detail & Related papers (2024-10-31T01:59:09Z) - Secure quantum-enhanced measurements on a network of sensors [0.0]
Two-party secure quantum remote sensing (SQRS) protocols enable quantum-enhanced measurements at remote locations with guaranteed security against eavesdroppers.
This idea can be scaled up to networks of nodes where one party can directly measure functions of parameters at the different nodes using entangled states.
Here we show how this problem can be overcome in a hybrid protocol that utilises both entangled and separable states to achieve quantum-enhanced measurement precision and security on networks of any size.
arXiv Detail & Related papers (2024-06-27T15:58:38Z) - Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Continuous-variable quantum passive optical network [0.0]
We propose continuous-variable quantum passive-optical-network (CV-QPON) protocols, enabling deterministic and simultaneous secret key generation among all network users.
We show two protocols with different trust levels assigned to the network users and experimentally demonstrate key generation in a quantum access network with 8 users.
arXiv Detail & Related papers (2024-02-25T09:56:56Z) - Entanglement-Assisted Quantum Networks: Mechanics, Enabling
Technologies, Challenges, and Research Directions [66.27337498864556]
This paper presents a comprehensive survey of entanglement-assisted quantum networks.
It provides a detailed overview of the network structure, working principles, and development stages.
It also emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization.
arXiv Detail & Related papers (2023-07-24T02:48:22Z) - Quantum key distribution with post-processing driven by physical
unclonable functions [2.233624388203003]
Quantum key-distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries.
This pre-shared secret key is used mainly for authentication purposes in the post-processing of classical data.
We discuss the conditions under which physical unclonable function can be integrated in currently available quantum key-distribution systems.
arXiv Detail & Related papers (2023-02-15T12:33:01Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Scalable authentication and optimal flooding in a quantum network [2.604279577944016]
We consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed.
First, an authentication transfer protocol to manage a fundamental limitation of quantum communication.
Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
arXiv Detail & Related papers (2021-01-28T19:00:07Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.