All graph state verification protocols are composably secure
- URL: http://arxiv.org/abs/2402.01445v1
- Date: Fri, 2 Feb 2024 14:37:26 GMT
- Title: All graph state verification protocols are composably secure
- Authors: L\'eo Colisson and Damian Markham and Raja Yehia
- Abstract summary: Graph state verification protocols allow multiple parties to share a graph state while checking that the state is honestly prepared, even in the presence of malicious parties.
Previous works conjectured that such a property could not be proven within the abstract cryptography framework.
We show that all graph state verification protocols can be turned into a composably secure protocol with respect to the natural functionality for graph state preparation.
- Score: 1.534667887016089
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Graph state verification protocols allow multiple parties to share a graph
state while checking that the state is honestly prepared, even in the presence
of malicious parties. Since graph states are the starting point of numerous
quantum protocols, it is crucial to ensure that graph state verification
protocols can safely be composed with other protocols, this property being
known as composable security. Previous works [YDK21] conjectured that such a
property could not be proven within the abstract cryptography framework: we
disprove this conjecture by showing that all graph state verification protocols
can be turned into a composably secure protocol with respect to the natural
functionality for graph state preparation. Moreover, we show that any unchanged
graph state verification protocols can also be considered as composably secure
for a slightly different, yet useful, functionality. Finally, we show that
these two results are optimal, in the sense that any such generic result,
considering arbitrary black-box protocols, must either modify the protocol or
consider a different functionality.
Along the way, we show a protocol to generalize entanglement swapping to
arbitrary graph states that might be of independent interest.
Related papers
- Public verifiable measurement-only blind quantum computation based on
entanglement witnesses [20.207593331052824]
A public verifiable protocol for measurement-only blind quantum computation is proposed.
The fidelity between arbitrary states and the graph states of 2-colorable graphs is estimated.
Our protocol is public verifiable in the true sense by allowing other random clients to execute the public verification.
arXiv Detail & Related papers (2023-10-03T17:16:15Z) - Security of a Continuous-Variable based Quantum Position Verification
Protocol [0.0]
We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
arXiv Detail & Related papers (2023-08-08T09:56:38Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - QuTE: decentralized multiple testing on sensor networks with false
discovery rate control [130.7122910646076]
This paper designs methods for decentralized multiple hypothesis testing on graphs equipped with provable guarantees on the false discovery rate (FDR)
We consider the setting where distinct agents reside on the nodes of an undirected graph, and each agent possesses p-values corresponding to one or more hypotheses local to its node.
Each agent must individually decide whether to reject one or more of its local hypotheses by only communicating with its neighbors, with the joint aim that the global FDR over the entire graph must be controlled at a predefined level.
arXiv Detail & Related papers (2022-10-09T19:48:39Z) - Efficient verification of Affleck-Kennedy-Lieb-Tasaki states [14.158567687044409]
Affleck-Kennedy-Lieb-Tasaki (AKLT) states are an important class of many-body quantum states.
We propose a general approach for constructing efficient verification protocols for AKLT states on arbitrary graphs.
arXiv Detail & Related papers (2022-06-30T14:24:37Z) - Collaborative likelihood-ratio estimation over graphs [55.98760097296213]
Graph-based Relative Unconstrained Least-squares Importance Fitting (GRULSIF)
We develop this idea in a concrete non-parametric method that we call Graph-based Relative Unconstrained Least-squares Importance Fitting (GRULSIF)
We derive convergence rates for our collaborative approach that highlights the role played by variables such as the number of available observations per node, the size of the graph, and how accurately the graph structure encodes the similarity between tasks.
arXiv Detail & Related papers (2022-05-28T15:37:03Z) - Byzantine-Robust Federated Learning with Optimal Statistical Rates and
Privacy Guarantees [123.0401978870009]
We propose Byzantine-robust federated learning protocols with nearly optimal statistical rates.
We benchmark against competing protocols and show the empirical superiority of the proposed protocols.
Our protocols with bucketing can be naturally combined with privacy-guaranteeing procedures to introduce security against a semi-honest server.
arXiv Detail & Related papers (2022-05-24T04:03:07Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - Verification of graph states in an untrusted network [0.0]
We consider verification of graph states generated by an untrusted source and shared between a network of possibly dishonest parties.
This has implications in certifying the application of graph states for various distributed tasks.
We present a protocol which is globally efficient for a large family of useful graph states.
arXiv Detail & Related papers (2020-07-26T13:17:21Z) - Composable Security for Multipartite Entanglement Verification [3.4806267677524896]
We present a composably secure protocol allowing $n$ parties to test an entanglement generation resource controlled by a possibly dishonest party.
The test consists only in local quantum operations and authenticated classical communication once a state is shared among them.
Our protocol can typically be used as a subroutine in a Quantum Internet, to securely share a GHZ state among the network before performing a communication or computation protocol.
arXiv Detail & Related papers (2020-04-16T14:33:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.