Measuring Quantum Information Leakage Under Detection Threat
- URL: http://arxiv.org/abs/2403.11433v1
- Date: Mon, 18 Mar 2024 03:07:09 GMT
- Title: Measuring Quantum Information Leakage Under Detection Threat
- Authors: Farhad Farokhi, Sejeong Kim,
- Abstract summary: Gentle quantum leakage is proposed as a measure of information leakage to arbitrary eavesdroppers.
Measures are used to encode the desire of the eavesdropper to evade detection.
Global depolarizing noise is shown to reduce gentle quantum leakage.
- Score: 7.82527155589504
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Gentle quantum leakage is proposed as a measure of information leakage to arbitrary eavesdroppers that aim to avoid detection. Gentle (also sometimes referred to as weak or non-demolition) measurements are used to encode the desire of the eavesdropper to evade detection. The gentle quantum leakage meets important axioms proposed for measures of information leakage including positivity, independence, and unitary invariance. Global depolarizing noise, an important family of physical noise in quantum devices, is shown to reduce gentle quantum leakage (and hence can be used as a mechanism to ensure privacy or security). A lower bound for the gentle quantum leakage based on asymmetric approximate cloning is presented. This lower bound relates information leakage to mutual incompatibility of quantum states. A numerical example, based on the encoding in the celebrated BB84 quantum key distribution algorithm, is used to demonstrate the results.
Related papers
- Barycentric and Pairwise Renyi Quantum Leakage [9.244521717083696]
Barycentric and pairwise quantum Renyi leakages are proposed as measures of information leakage for privacy and security analysis.
They satisfy important properties of positivity, independence, post-processing inequality, and unitary invariance.
Global and local depolarizing channels, that are common models of noise in quantum computing and communication, restrict private or secure information leakage.
arXiv Detail & Related papers (2024-02-09T03:09:33Z) - Power Characterization of Noisy Quantum Kernels [52.47151453259434]
We show that noise may make quantum kernel methods to only have poor prediction capability, even when the generalization error is small.
We provide a crucial warning to employ noisy quantum kernel methods for quantum computation.
arXiv Detail & Related papers (2024-01-31T01:02:16Z) - Maximal Information Leakage from Quantum Encoding of Classical Data [9.244521717083696]
An adversary can access a single copy of the state of a quantum system that encodes some classical data.
The resulting measure of information leakage is the multiplicative increase of the probability of correctly guessing any function of the classical data.
arXiv Detail & Related papers (2023-07-24T05:16:02Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - Certified Robustness of Quantum Classifiers against Adversarial Examples
through Quantum Noise [68.1992787416233]
We show that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks.
We derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples.
arXiv Detail & Related papers (2022-11-02T05:17:04Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Quantum information spreading in a disordered quantum walk [50.591267188664666]
We design a quantum probing protocol using Quantum Walks to investigate the Quantum Information spreading pattern.
We focus on the coherent static and dynamic disorder to investigate anomalous and classical transport.
Our results show that a Quantum Walk can be considered as a readout device of information about defects and perturbations occurring in complex networks.
arXiv Detail & Related papers (2020-10-20T20:03:19Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.