Advantage of multi-partite entanglement for quantum cryptography over
long and short ranged networks
- URL: http://arxiv.org/abs/2312.13376v1
- Date: Wed, 20 Dec 2023 19:04:17 GMT
- Title: Advantage of multi-partite entanglement for quantum cryptography over
long and short ranged networks
- Authors: Janka Memmen, Jens Eisert, Nathan Walk
- Abstract summary: We show the security of a variant of the GHZ state based secret sharing protocol against general attacks.
We then identify parameters for a performance advantage over realistic bottleneck networks.
The addition of quantum repeaters unlocks the performance advantage of multi-partite entanglement over point-to-point approaches.
- Score: 0.3683202928838613
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The increasing sophistication of available quantum networks has seen a
corresponding growth in the pursuit of multi-partite cryptographic protocols.
Whilst the use of multi-partite entanglement is known to offer an advantage in
certain abstractly motivated contexts, the quest to find practical advantage
scenarios is ongoing and substantial difficulties in generalising some
bi-partite security proofs still remain. We present rigorous results that
address both these challenges at the same time. First, we prove the security of
a variant of the GHZ state based secret sharing protocol against general
attacks, including participant attacks which break the security of the original
GHZ state scheme. We then identify parameters for a performance advantage over
realistic bottleneck networks. We show that whilst channel losses limit the
advantage region to short distances over direct transmission networks, the
addition of quantum repeaters unlocks the performance advantage of
multi-partite entanglement over point-to-point approaches for long distance
quantum cryptography.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Source-independent quantum secret sharing with entangled photon pair networks [15.3505990843415]
We present an efficient source-independent QSS protocol utilizing entangled photon pairs in quantum networks.
Our protocol has great performance and technical advantages in future quantum networks.
arXiv Detail & Related papers (2024-07-23T13:24:28Z) - Continuous-variable quantum digital signatures against coherent attacks [5.777874043843867]
Quantum digital signatures (QDS) guarantee authenticity, integrity and non-repudiation of classical messages based on quantum laws.
We introduce a CV QDS protocol designed to withstand general coherent attacks through the use of a cutting-edge fidelity test function.
Results demonstrate a significant reduction of over 6 orders of magnitude in signature length for a megabit message signing task.
arXiv Detail & Related papers (2024-07-04T03:39:59Z) - Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Multi-User Entanglement Distribution in Quantum Networks Using Multipath
Routing [55.2480439325792]
We propose three protocols that increase the entanglement rate of multi-user applications by leveraging multipath routing.
The protocols are evaluated on quantum networks with NISQ constraints, including limited quantum memories and probabilistic entanglement generation.
arXiv Detail & Related papers (2023-03-06T18:06:00Z) - Breaking universal limitations on quantum conference key agreement
without quantum memory [6.300599548850421]
We report a measurement-device-independent quantum conference key agreement protocol with enhanced transmission efficiency over lossy channel.
Our protocol can break key rate bounds on quantum communication over quantum network without quantum memory.
Based on our results, we anticipate that our protocol will play an indispensable role in constructing multipartite quantum network.
arXiv Detail & Related papers (2022-12-10T06:37:53Z) - Analysis of Multiple Overlapping Paths algorithms for Secure Key
Exchange in Large-Scale Quantum Networks [0.0]
Current implementations of quantum networks are unavoidably equipped with trusted nodes.
Some new authentication and key exchange schemes must be considered to fully benefit from the unconditional security of links.
One such approach uses Multiple Non-Overlapping Paths (MNOPs) for key exchange to mitigate the risk of an attack on a trusted node.
arXiv Detail & Related papers (2022-05-06T12:40:52Z) - Sharing classical secrets with continuous-variable entanglement:
Composable security and network coding advantage [0.913755431537592]
We show that multi-partite entangled resources achieve a genuine advantage over point-to-point protocols for quantum communication.
This is the first concrete compelling examples of multi-partite entangled resources achieving a genuine advantage over point-to-point protocols for quantum communication.
arXiv Detail & Related papers (2021-04-21T17:37:28Z) - Experimental quantum conference key agreement [55.41644538483948]
Quantum networks will provide multi-node entanglement over long distances to enable secure communication on a global scale.
Here we demonstrate quantum conference key agreement, a quantum communication protocol that exploits multi-partite entanglement.
We distribute four-photon Greenberger-Horne-Zeilinger (GHZ) states generated by high-brightness, telecom photon-pair sources across up to 50 km of fibre.
arXiv Detail & Related papers (2020-02-04T19:00:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.