Security of a Continuous-Variable based Quantum Position Verification
Protocol
- URL: http://arxiv.org/abs/2308.04166v1
- Date: Tue, 8 Aug 2023 09:56:38 GMT
- Title: Security of a Continuous-Variable based Quantum Position Verification
Protocol
- Authors: Rene Allerstorfer, Lloren\c{c} Escol\`a-Farr\`as, Arpan Akash Ray,
Boris \v{S}kori\'c, Florian Speelman, Philip Verduyn Lunel
- Abstract summary: We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this work we study quantum position verification with continuous-variable
quantum states. In contrast to existing discrete protocols, we present and
analyze a protocol that utilizes coherent states and its properties. Compared
to discrete-variable photonic states, coherent states offer practical
advantages since they can be efficiently prepared and manipulated with current
technology. We prove security of the protocol against any unentangled attackers
via entropic uncertainty relations, showing that the adversary has more
uncertainty than the honest prover about the correct response as long as the
noise in the quantum channel is below a certain threshold. Additionally, we
show that attackers who pre-share one continuous-variable EPR pair can break
the protocol.
Related papers
- Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Inferring State Machine from the Protocol Implementation via Large Language Model [18.942047454890847]
We propose an innovative state machine inference approach powered by Large Language Models (LLMs)
Our evaluation across six protocol implementations demonstrates the method's high efficacy, achieving an accuracy rate exceeding 90%.
Our proposed method not only marks a significant step forward in accurate state machine inference but also opens new avenues for improving the security and reliability of protocol implementations.
arXiv Detail & Related papers (2024-05-01T08:46:36Z) - Continuous-variable Quantum Position Verification secure against entangled attackers [0.6011824091708076]
We show that a quantum position verification protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement.
We show that the protocol remains secure for certain attenuation and excess noise.
arXiv Detail & Related papers (2024-04-22T15:09:36Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Resource analysis for quantum-aided Byzantine agreement with the four-qubit singlet state [1.2094859111770522]
In distributed computing, a Byzantine fault is a condition where a component behaves inconsistently, showing different symptoms to different components of the system.
Our work highlights important engineering aspects of the future deployment of quantum communication protocols with multi-qubit entangled states.
arXiv Detail & Related papers (2022-07-11T15:17:58Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - How to Verify Identity in the Continuous Variable Quantum System? [14.871034136378366]
We propose a continuous variable quantum identification (CV-QI) protocol based on the correlation of two-mode squeezed vacuum state and the continuous variable teleportation.
The bidirectional identity verification between two participants of the communication can be achieved by the proposed CV-QI protocol.
arXiv Detail & Related papers (2022-02-22T12:24:41Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Efficient verification of continuous-variable quantum states and devices
without assuming identical and independent operations [1.2862023695904006]
We propose the first set of reliable protocols for verifying multimode continuous-variable entangled states and devices.
Although not fully universal, these protocols are applicable to Gaussian quantum states, non-Gaussian hypergraph states, as well as amplification, attenuation, and purification of noisy coherent states.
arXiv Detail & Related papers (2020-12-07T15:26:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.