Security of a Continuous-Variable based Quantum Position Verification
Protocol
- URL: http://arxiv.org/abs/2308.04166v1
- Date: Tue, 8 Aug 2023 09:56:38 GMT
- Title: Security of a Continuous-Variable based Quantum Position Verification
Protocol
- Authors: Rene Allerstorfer, Lloren\c{c} Escol\`a-Farr\`as, Arpan Akash Ray,
Boris \v{S}kori\'c, Florian Speelman, Philip Verduyn Lunel
- Abstract summary: We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this work we study quantum position verification with continuous-variable
quantum states. In contrast to existing discrete protocols, we present and
analyze a protocol that utilizes coherent states and its properties. Compared
to discrete-variable photonic states, coherent states offer practical
advantages since they can be efficiently prepared and manipulated with current
technology. We prove security of the protocol against any unentangled attackers
via entropic uncertainty relations, showing that the adversary has more
uncertainty than the honest prover about the correct response as long as the
noise in the quantum channel is below a certain threshold. Additionally, we
show that attackers who pre-share one continuous-variable EPR pair can break
the protocol.
Related papers
- Device-independent secure correlations in sequential quantum scenarios [44.99833362998488]
Device-independent quantum information is attracting significant attention, particularly for its applications in information security.
We propose a systematic approach to designing sequential quantum protocols for device-independent security.
We analytically prove that, with this systematic construction, the resulting ideal correlations are secure in the sense that they cannot be reproduced as a statistical mixture of other correlations.
arXiv Detail & Related papers (2025-03-18T16:45:20Z) - Quantum position verification in one shot: parallel repetition of the $f$-BB84 and $f$-routing protocols [0.0]
We show that security for a one-round protocol can rely on the size of the classical information rather than quantum resources.
We establish parallel repetition of the $f$-BB84 and $f$-routing QPV protocols.
arXiv Detail & Related papers (2025-03-12T17:00:32Z) - Bayesian Quantum Amplitude Estimation [49.1574468325115]
We introduce BAE, a noise-aware Bayesian algorithm for quantum amplitude estimation.
We show that BAE achieves Heisenberg-limited estimation and benchmark it against other approaches.
arXiv Detail & Related papers (2024-12-05T18:09:41Z) - Quantum Rewinding for IOP-Based Succinct Arguments [45.5096562396529]
We prove that an interactive variant of the BCS transformation is secure in the standard model against quantum adversaries when the vector commitment scheme is collapsing.
As a consequence of our results, we obtain standard-model post-quantum secure succinct arguments with the best complexity known.
arXiv Detail & Related papers (2024-11-08T06:33:08Z) - Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Continuous-variable Quantum Position Verification secure against entangled attackers [0.6011824091708076]
We show that a quantum position verification protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement.
We show that the protocol remains secure for certain attenuation and excess noise.
arXiv Detail & Related papers (2024-04-22T15:09:36Z) - Secure and robust randomness with sequential quantum measurements [0.0]
We prove a Tsirelson-like boundary for sequential quantum correlations, which represents a trade-off in nonlocality shared by sequential users.
Our simple qubit protocol reaches this boundary, and numerical analysis shows improved robustness under realistic noise.
This study advances understanding of sequential quantum correlations and offers insights for efficient device-independent protocols.
arXiv Detail & Related papers (2023-09-21T17:50:29Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - How to Verify Identity in the Continuous Variable Quantum System? [14.871034136378366]
We propose a continuous variable quantum identification (CV-QI) protocol based on the correlation of two-mode squeezed vacuum state and the continuous variable teleportation.
The bidirectional identity verification between two participants of the communication can be achieved by the proposed CV-QI protocol.
arXiv Detail & Related papers (2022-02-22T12:24:41Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Efficient verification of continuous-variable quantum states and devices
without assuming identical and independent operations [1.2862023695904006]
We propose the first set of reliable protocols for verifying multimode continuous-variable entangled states and devices.
Although not fully universal, these protocols are applicable to Gaussian quantum states, non-Gaussian hypergraph states, as well as amplification, attenuation, and purification of noisy coherent states.
arXiv Detail & Related papers (2020-12-07T15:26:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.