Multipartite quantum cryptography based on the violation of Svetlichny's
inequality
- URL: http://arxiv.org/abs/2302.11771v1
- Date: Thu, 23 Feb 2023 04:23:43 GMT
- Title: Multipartite quantum cryptography based on the violation of Svetlichny's
inequality
- Authors: Yang Xiang
- Abstract summary: We present a quantum key distribution scheme in which three separated observers can securely share a set of keys.
We prove that the violation of Svetlichny's inequality can be utilized to test for eavesdropping.
- Score: 12.717839871971517
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Multipartite cryptography is useful for some particular missions. In this
paper, we present a quantum key distribution scheme in which three separated
observers can securely share a set of keys by using a sequence of $3$-particle
GHZ states. We prove that the violation of Svetlichny's inequality can be
utilized to test for eavesdropping, and even when the eavesdropper can
completely control the outcomes of two participants' measurements, our scheme
still ensures the security of the keys distribution. This scheme can be easily
extended to the case of $N$-party keys distribution, and the violation of
$N$-partite Svetlichny's inequality guarantees the security of the generalized
scheme. Since the GHZ state has maximum entanglement, its perfect monogamy
guarantee the device-independent security of our protocol. However quantum
entanglement is a vulnerable resource which is often decayed during
transmission, so we need here to derive the secret-key rate of our protocol
under the condition of using quantum states with non-maximal entanglement. We
then calculate the extractable secret-key rate of the three-party key
distribution protocol for the Werner state in the device-independent scenario.
We find that the value of the extractable secret-key rate monotonously
approaches $1$ as the value of the visibility of the Werner state increases,
and it reaches its maximum value $1$ when the Werner state becomes the GHZ
state.
Related papers
- Quantum control landscape for generation of $H$ and $T$ gates in an open
qubit with both coherent and environmental drive [57.70351255180495]
An important problem in quantum computation is generation of single-qubit quantum gates such as Hadamard ($H$) and $pi/8$ ($T$)
Here we consider the problem of optimal generation of $H$ and $T$ gates using coherent control and the environment as a resource acting on the qubit via incoherent control.
arXiv Detail & Related papers (2023-09-05T09:05:27Z) - Quantum Key Distribution using Expectation Values of Super-classical GHZ
States [0.0]
We propose a new quantum key distribution scheme that is based on the optimum expectation values of maximally entangled Greenberger-Horne-Zeilinger states.
Our protocol makes use of the degrees of freedom in continuously variable angles, thereby increasing the security of the key distribution.
arXiv Detail & Related papers (2023-08-17T21:40:21Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Secure distribution of a certified random quantum key using an entangled
memory qubit [0.0]
We produce a certified random secret key on both endpoints of the quantum communication channel.
We certify the randomness of the key using the min-entropy of the atom-photon state.
arXiv Detail & Related papers (2021-11-29T13:31:30Z) - Qutrit-based semi-quantum key distribution protocol [0.0]
This article provides the unconditional security of a semi quantum key distribution protocol based on 3-dimensional states.
We find that this protocol has improved secret key rate with much more tolerance for noise compared to the previous 2-dimensional SQKD protocol.
arXiv Detail & Related papers (2021-01-07T15:16:29Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Entropy bounds for multiparty device-independent cryptography [0.0]
We show that genuine multipartite entanglement is necessary to certify the privacy of a party's outcome.
We obtain the entropy bounds thanks to two general results of independent interest.
arXiv Detail & Related papers (2020-04-29T15:22:57Z) - The phase matching quantum key distribution protocol with 3-state
systems [0.0]
Quantum Key Distribution, as a branch of quantum mechanics in cryptography, can distribute keys between legal communication parties in an unconditionally secure manner.
We consider a Phase-Matching Quantum Key Distribution protocol with 3-state systems for the first time, where the phase of the coherent state is 3.
arXiv Detail & Related papers (2020-02-22T09:15:44Z) - Genuine Network Multipartite Entanglement [62.997667081978825]
We argue that a source capable of distributing bipartite entanglement can, by itself, generate genuine $k$-partite entangled states for any $k$.
We provide analytic and numerical witnesses of genuine network entanglement, and we reinterpret many past quantum experiments as demonstrations of this feature.
arXiv Detail & Related papers (2020-02-07T13:26:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.