Making Existing Quantum Position Verification Protocols Secure Against
Arbitrary Transmission Loss
- URL: http://arxiv.org/abs/2312.12614v1
- Date: Tue, 19 Dec 2023 21:38:10 GMT
- Title: Making Existing Quantum Position Verification Protocols Secure Against
Arbitrary Transmission Loss
- Authors: Rene Allerstorfer, Andreas Bluhm, Harry Buhrman, Matthias Christandl,
Lloren\c{c} Escol\`a-Farr\`as, Florian Speelman, Philip Verduyn Lunel
- Abstract summary: In quantum position verification (QPV) protocols, even relatively small loss rates can compromise security.
We modify the usual structure of QPV protocols and prove that this modification makes the potentially high transmission loss between the verifiers security-irrelevant.
We show possible implementations of the required photon presence detection, making c-$mathrmQPV_mathrmBB84f$ a protocol that solves all major practical issues in QPV.
- Score: 0.889974344676093
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Signal loss poses a significant threat to the security of quantum
cryptography when the chosen protocol lacks loss-tolerance. In quantum position
verification (QPV) protocols, even relatively small loss rates can compromise
security. The goal is thus to find protocols that remain secure under
practically achievable loss rates. In this work, we modify the usual structure
of QPV protocols and prove that this modification makes the potentially high
transmission loss between the verifiers and the prover security-irrelevant for
a class of protocols that includes a practically-interesting candidate protocol
inspired by the BB84 protocol ($\mathrm{QPV}_{\mathrm{BB84}}^{f}$). This
modification, which involves photon presence detection, a small time delay at
the prover, and a commitment to play before proceeding, reduces the overall
loss rate to just the prover's laboratory. The adapted protocol
c-$\mathrm{QPV}_{\mathrm{BB84}}^{f}$ then becomes a practically feasible QPV
protocol with strong security guarantees, even against attackers using adaptive
strategies. As the loss rate between the verifiers and prover is mainly
dictated by the distance between them, secure QPV over longer distances becomes
possible. We also show possible implementations of the required photon presence
detection, making c-$\mathrm{QPV}_{\mathrm{BB84}}^{f}$ a protocol that solves
all major practical issues in QPV. Finally, we discuss experimental aspects and
give parameter estimations.
Related papers
- Device-independent quantum key distribution based on routed Bell tests [0.0]
We investigate DIQKD protocols based on a routed setup.
In these protocols, photons from the source are routed by an actively controlled switch to a nearby test device instead of the distant one.
We find that in an ideal case routed DIQKD protocols can significantly improve detection efficiency requirements, by up to $sim 30%$.
arXiv Detail & Related papers (2024-04-01T15:59:09Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Single-qubit loss-tolerant quantum position verification protocol secure
against entangled attackers [0.0]
We study the exact loss-tolerance of the most popular protocol for QPV, which is based on BB84 states.
We show how these results transfer to the variant protocol which combines $n$ bits of classical information with a single qubit.
arXiv Detail & Related papers (2022-12-07T14:39:56Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Towards practical and error-robust quantum position verification [0.0]
Loss of inputs can be detrimental to the security of quantum position verification (QPV) protocols.
We propose a new fully loss-tolerant protocol QPV$_textsfSWAP$, based on the SWAP test.
We show that the protocol remains secure even if unentangled attackers are allowed to quantum communicate.
arXiv Detail & Related papers (2021-06-24T11:10:44Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.