Security of a Continuous-Variable based Quantum Position Verification
Protocol
- URL: http://arxiv.org/abs/2308.04166v1
- Date: Tue, 8 Aug 2023 09:56:38 GMT
- Title: Security of a Continuous-Variable based Quantum Position Verification
Protocol
- Authors: Rene Allerstorfer, Lloren\c{c} Escol\`a-Farr\`as, Arpan Akash Ray,
Boris \v{S}kori\'c, Florian Speelman, Philip Verduyn Lunel
- Abstract summary: We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this work we study quantum position verification with continuous-variable
quantum states. In contrast to existing discrete protocols, we present and
analyze a protocol that utilizes coherent states and its properties. Compared
to discrete-variable photonic states, coherent states offer practical
advantages since they can be efficiently prepared and manipulated with current
technology. We prove security of the protocol against any unentangled attackers
via entropic uncertainty relations, showing that the adversary has more
uncertainty than the honest prover about the correct response as long as the
noise in the quantum channel is below a certain threshold. Additionally, we
show that attackers who pre-share one continuous-variable EPR pair can break
the protocol.
Related papers
- Quantum Rewinding for IOP-Based Succinct Arguments [45.5096562396529]
We prove that an interactive variant of the BCS transformation is secure in the standard model against quantum adversaries when the vector commitment scheme is collapsing.
As a consequence of our results, we obtain standard-model post-quantum secure succinct arguments with the best complexity known.
arXiv Detail & Related papers (2024-11-08T06:33:08Z) - Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Continuous-variable Quantum Position Verification secure against entangled attackers [0.6011824091708076]
We show that a quantum position verification protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement.
We show that the protocol remains secure for certain attenuation and excess noise.
arXiv Detail & Related papers (2024-04-22T15:09:36Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - How to Verify Identity in the Continuous Variable Quantum System? [14.871034136378366]
We propose a continuous variable quantum identification (CV-QI) protocol based on the correlation of two-mode squeezed vacuum state and the continuous variable teleportation.
The bidirectional identity verification between two participants of the communication can be achieved by the proposed CV-QI protocol.
arXiv Detail & Related papers (2022-02-22T12:24:41Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Efficient verification of continuous-variable quantum states and devices
without assuming identical and independent operations [1.2862023695904006]
We propose the first set of reliable protocols for verifying multimode continuous-variable entangled states and devices.
Although not fully universal, these protocols are applicable to Gaussian quantum states, non-Gaussian hypergraph states, as well as amplification, attenuation, and purification of noisy coherent states.
arXiv Detail & Related papers (2020-12-07T15:26:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.