Efficient and secure quantum network coding based on quantum full
homomorphic encryption
- URL: http://arxiv.org/abs/2305.15978v1
- Date: Thu, 25 May 2023 12:17:15 GMT
- Title: Efficient and secure quantum network coding based on quantum full
homomorphic encryption
- Authors: Ning Wang, Fei Gao, Song Lin
- Abstract summary: A quantum full homomorphic encryption protocol is constructed utilizing $d$-dimensional universal quantum gates.
The proposed protocol not only enables to transfer information in $d$-dimensional quantum system, but also requires only 1 quantum gate and a key of length 2 in the encryption phase.
- Score: 9.06651457984998
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Based on $d$-dimensional quantum full homomorphic encryption, an efficient
and secure quantum network coding protocol is proposed in this paper. First, a
quantum full homomorphic encryption protocol is constructed utilizing
$d$-dimensional universal quantum gates. On this basis, an efficient quantum
network coding protocol is proposed. In the protocol, two source nodes encrypt
their respective prepared quantum states with the quantum full homomorphic
encryption protocol. The two intermediate nodes successively perform
homomorphic evaluation of the received quantum states. Finally, the two sink
nodes recover the quantum states transmitted by the two source nodes in the
butterfly network depending on their measurement results. The performance
analysis shows that the proposed quantum network coding protocol is correct and
resistant to attacks launched by dishonest intermediate nodes and external
eavesdroppers. Compared to related protocols, the proposed protocol not only
enables to transfer information in $d$-dimensional quantum system, but also
requires only 1 quantum gate and a key of length 2 in the encryption phase,
which makes the protocol has higher efficiency.
Related papers
- Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Secured Quantum Identity Authentication Protocol for Quantum Networks [2.3317857568404032]
This paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements.
Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys.
arXiv Detail & Related papers (2023-12-10T05:36:49Z) - Two-Server Oblivious Transfer for Quantum Messages [71.78056556634196]
We propose two-server oblivious transfer protocols for quantum messages.
Oblivious transfer is considered as a cryptographic primitive task for quantum information processing over quantum network.
arXiv Detail & Related papers (2022-11-07T05:12:24Z) - Oblivious Quantum Computation and Delegated Multiparty Quantum
Computation [61.12008553173672]
We propose a new concept, oblivious computation quantum computation, where secrecy of the input qubits and the program to identify the quantum gates are required.
Exploiting quantum teleportation, we propose a two-server protocol for this task.
Also, we discuss delegated multiparty quantum computation, in which, several users ask multiparty quantum computation to server(s) only using classical communications.
arXiv Detail & Related papers (2022-11-02T09:01:33Z) - Quantum secure dialogue with quantum encryption [0.0]
We propose a novel approach for sharing the initial quantum state privately between communicators.
The proposed protocol uses EPR pairs as the private quantum key to encrypt and decrypt the traveling photons.
The information-theoretical efficiency of the proposed protocol is nearly 100%, much higher than previous information leakage resistant quantum dialogue protocols.
arXiv Detail & Related papers (2022-05-04T04:05:49Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Benchmarking of Quantum Protocols [0.9176056742068812]
We consider several quantum protocols that enable promising functionalities and services in near-future quantum networks.
We use NetSquid simulation platform to evaluate the effect of various sources of noise on the performance of these protocols.
arXiv Detail & Related papers (2021-11-03T21:17:04Z) - A practical quantum encryption protocol with varying encryption
configurations [0.0]
We propose a quantum encryption protocol that utilizes a quantum algorithm to create blocks oftext ciphers based on quantum states.
The main feature of our quantum encryption protocol is that the encryption configuration of each block is determined by the previous blocks.
arXiv Detail & Related papers (2021-01-22T20:09:03Z) - Quantum Key-Distribution Protocols Based on a Quantum Version of the
Monty Hall Game [0.0]
The study proposed two quantum key-distribution protocols based on the quantum version of the Monty Hall game devised by Flitney and Abbott.
The motivation behind the second proposal is to simplify a possible physical implementation by adapting the formalism of the qutrit protocol to use qubits and simple logical quantum gates.
arXiv Detail & Related papers (2020-05-11T22:06:30Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.