Security of One-Way Entanglement Purification with Quantum Sampling
Against a Restricted Adversary
- URL: http://arxiv.org/abs/2306.10455v1
- Date: Sun, 18 Jun 2023 02:29:21 GMT
- Title: Security of One-Way Entanglement Purification with Quantum Sampling
Against a Restricted Adversary
- Authors: Cameron Cianci
- Abstract summary: Entanglement purification protocols promise to play a critical role in the future of quantum networks by distributing entanglement across noisy channels.
We propose a one-way entanglement purification protocol which utilizes quantum sampling and prove its security against an adversary restricted to single qubit Pauli gates.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Entanglement purification protocols promise to play a critical role in the
future of quantum networks by distributing entanglement across noisy channels.
However, only the security of two-way purification protocols have been closely
studied. To address this, we propose a one-way entanglement purification
protocol which utilizes quantum sampling and prove its security against an
adversary restricted to single qubit Pauli gates. This is done through
leveraging the equivalence of one-way entanglement purification protocols with
error-correcting codes. To prove the security of this protocol, we first use
the quantum sampling framework introduced by Bouman and Fehr to estimate the
Hamming weight of the qubits which passed through the channel and then use the
estimated relative Hamming weight $\omega$ to determine the amount of
interference that Eve has subjected to the quantum channel. Since Eve is
restricted to single qubit Pauli gates, the number of applied gates can be
directly estimated using the Hamming weight. Estimating the number of
adversarial single qubit gates, allows us to perform error correction and
disentangle the logical qubit from Eve with probability
$1-\epsilon_{qu}^\delta$. Since this protocol allows communication only in one
direction, the distance of the code must be decided before transmission, and
therefore Bob will be forced to abort the protocol if he finds that Eve has
applied more gates than the code can correct. One-way protocols may find use
when communication is limited, or when we desire to decrease latency compared
to the multiple rounds of communication needed in two-way protocols. Further
research may investigate the security of this protocol against arbitrary single
or multi-qubit gates to obtain security guarantees against a more general
adversary.
Related papers
- Capacity-Achieving Entanglement Purification Protocol for Pauli Dephasing Channel [1.6632263048576381]
A simple entanglement swapping protocol via a central node is not effective against the Pauli dephasing channel.
This highlights the importance of purifying distributed Bell states before performing entanglement swapping.
We introduce an entanglement purification protocol assisted by two-way classical communication that not only purifies the states but also achieves the channel capacities.
arXiv Detail & Related papers (2024-11-21T20:41:16Z) - An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol
Using Bell States [16.277401577186605]
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al.
Zhu et al. pointed out that there are some security flaws and proposed an improved version.
This study shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
arXiv Detail & Related papers (2023-09-22T09:02:18Z) - Satellite-Based Quantum Key Distribution in the Presence of Bypass
Channels [44.81834231082477]
Security of quantum key distribution under restricted eavesdropping scenarios is addressed.
We find regimes of operation in which the above restrictions on Eve can considerably improve system performance.
Our work opens up new security frameworks for spaceborne quantum communications systems.
arXiv Detail & Related papers (2022-12-09T12:24:40Z) - Single-qubit loss-tolerant quantum position verification protocol secure
against entangled attackers [0.0]
We study the exact loss-tolerance of the most popular protocol for QPV, which is based on BB84 states.
We show how these results transfer to the variant protocol which combines $n$ bits of classical information with a single qubit.
arXiv Detail & Related papers (2022-12-07T14:39:56Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Thermal relaxation error on QKD: Effect and A Probable Bypass [0.0]
Quantum cryptography was proposed as a counter to the capacity of quantum computers to break classical cryptosystems.
We study the performance of two QKD protocols - BB84 and E91 under thermal relaxation error.
arXiv Detail & Related papers (2022-07-04T01:46:41Z) - Improved Semi-Quantum Key Distribution with Two Almost-Classical Users [1.827510863075184]
We revisit a mediated semi-quantum key distribution protocol introduced by Massa et al.
We show how this protocol may be extended to improve its efficiency and also its noise tolerance.
We evaluate the protocol's performance in a variety of lossy and noisy channels.
arXiv Detail & Related papers (2022-03-20T14:41:14Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.