On Zero-Knowledge Proofs over the Quantum Internet
- URL: http://arxiv.org/abs/2212.03027v6
- Date: Sun, 6 Aug 2023 17:29:41 GMT
- Title: On Zero-Knowledge Proofs over the Quantum Internet
- Authors: Mark Carney
- Abstract summary: This paper presents a new method for quantum identity authentication (QIA) protocols.
The logic of classical zero-knowledge proofs (ZKPs) due to Schnorr is applied in quantum circuits and algorithms.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper presents a new method for quantum identity authentication (QIA)
protocols. The logic of classical zero-knowledge proofs (ZKPs) due to Schnorr
is applied in quantum circuits and algorithms. This novel approach gives an
exact way with which a prover $P$ can prove they know some secret by
encapsulating it in a quantum state before sending to a verifier $V$ by means
of a quantum channel - allowing for a ZKP wherein an eavesdropper or
manipulation can be detected with a fail-safe design. This is achieved by
moving away from the hardness of the Discrete Logarithm Problem towards the
hardness of estimating quantum states. This paper presents a method with which
this can be achieved and some bounds for the security of the protocol provided.
With the anticipated advent of a `quantum internet', such protocols and ideas
may soon have utility and execution in the real world.
Related papers
- Classical certification of quantum gates under the dimension assumption [0.1874930567916036]
We develop an efficient method for certifying single-qubit quantum gates in a black-box scenario.
We prove that the method's sample complexity grows as $mathrmO(varepsilon-1)$.
We show that the proposed method can be used to certify a gate set universal for single-qubit quantum computation.
arXiv Detail & Related papers (2024-01-30T13:40:39Z) - Secured Quantum Identity Authentication Protocol for Quantum Networks [2.3317857568404032]
This paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements.
Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys.
arXiv Detail & Related papers (2023-12-10T05:36:49Z) - Quantum process tomography of continuous-variable gates using coherent
states [49.299443295581064]
We demonstrate the use of coherent-state quantum process tomography (csQPT) for a bosonic-mode superconducting circuit.
We show results for this method by characterizing a logical quantum gate constructed using displacement and SNAP operations on an encoded qubit.
arXiv Detail & Related papers (2023-03-02T18:08:08Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Quantum oblivious transfer: a short review [0.06554326244334865]
We study the concept of oblivious transfer in the area of theoretical quantum cryptography.
We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
arXiv Detail & Related papers (2022-06-06T15:19:26Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Quantum computation capability verification protocol for NISQ devices
with dihedral coset problem [0.4061135251278187]
We propose an interactive protocol for one party (the verifier) holding a quantum computer to verify the quantum computation power of another party's (the prover) device via a one-way quantum channel.
We conduct a 4-qubit experiment on one of IBM Q devices.
arXiv Detail & Related papers (2022-02-14T19:00:58Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power [1.9737117321211988]
Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
arXiv Detail & Related papers (2020-05-04T14:28:14Z) - Using Quantum Metrological Bounds in Quantum Error Correction: A Simple
Proof of the Approximate Eastin-Knill Theorem [77.34726150561087]
We present a proof of the approximate Eastin-Knill theorem, which connects the quality of a quantum error-correcting code with its ability to achieve a universal set of logical gates.
Our derivation employs powerful bounds on the quantum Fisher information in generic quantum metrological protocols.
arXiv Detail & Related papers (2020-04-24T17:58:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.