Perfect cheating is impossible for single-qubit position verification
- URL: http://arxiv.org/abs/2406.20022v1
- Date: Fri, 28 Jun 2024 16:13:38 GMT
- Title: Perfect cheating is impossible for single-qubit position verification
- Authors: Carl A. Miller, Yusuf Alnawakhtha,
- Abstract summary: In quantum position verification, a prover certifies her location by performing a quantum computation and returning the results to a set of trusted verifiers.
One of the very first protocols for quantum position verification was proposed in (Kent, Munro, Spiller 2011)
We show that there is no perfect finite-dimensional cheating strategy for the original KMS measurement protocol.
- Score: 0.9208007322096533
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: In quantum position verification, a prover certifies her location by performing a quantum computation and returning the results (at the speed of light) to a set of trusted verifiers. One of the very first protocols for quantum position verification was proposed in (Kent, Munro, Spiller 2011): the prover receives a qubit $Q$ from one direction, receives an orthogonal basis $\{ v, v^\perp \}$ from the opposite direction, then measures $Q$ in $\{ v, v^\perp \}$ and broadcasts the result. A number of variants of this protocol have been proposed and analyzed, but the question of whether the original protocol itself is secure has never been fully resolved. In this work we show that there is no perfect finite-dimensional cheating strategy for the original KMS measurement protocol. Our approach makes use of tools from real algebraic geometry.
Related papers
- The role of shared randomness in quantum state certification with
unentangled measurements [36.19846254657676]
We study quantum state certification using unentangled quantum measurements.
$Theta(d2/varepsilon2)$ copies are necessary and sufficient for state certification.
We develop a unified lower bound framework for both fixed and randomized measurements.
arXiv Detail & Related papers (2024-01-17T23:44:52Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - On Zero-Knowledge Proofs over the Quantum Internet [0.0]
This paper presents a new method for quantum identity authentication (QIA) protocols.
The logic of classical zero-knowledge proofs (ZKPs) due to Schnorr is applied in quantum circuits and algorithms.
arXiv Detail & Related papers (2022-12-06T14:57:00Z) - QuTE: decentralized multiple testing on sensor networks with false
discovery rate control [130.7122910646076]
This paper designs methods for decentralized multiple hypothesis testing on graphs equipped with provable guarantees on the false discovery rate (FDR)
We consider the setting where distinct agents reside on the nodes of an undirected graph, and each agent possesses p-values corresponding to one or more hypotheses local to its node.
Each agent must individually decide whether to reject one or more of its local hypotheses by only communicating with its neighbors, with the joint aim that the global FDR over the entire graph must be controlled at a predefined level.
arXiv Detail & Related papers (2022-10-09T19:48:39Z) - Efficient Certifiable Randomness from a Single Quantum Device [6.531546527140474]
We use the leakage resilience properties of the Learning With problem to address the rate of generation of randomness.
Our new protocol can certify $Omega(n)$ fresh bits of randomness in constant rounds.
arXiv Detail & Related papers (2022-04-24T20:32:17Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Robust certification of arbitrary outcome quantum measurements from
temporal correlations [0.0]
We establish a protocol for certification of a particular set of $d$-outcome quantum measurements.
We show that our protocol is robust against practical non-ideal realizations.
As an offshoot of our protocol, we present a scheme for secure certification of genuine quantum randomness.
arXiv Detail & Related papers (2021-10-03T16:19:16Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Geometry of Banach spaces: a new route towards Position Based
Cryptography [65.51757376525798]
We study Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games.
The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol.
We show that the understanding of the type properties of some more involved Banach spaces would allow to drop out the assumptions and lead to unconditional lower bounds on the resources used to attack our protocol.
arXiv Detail & Related papers (2021-03-30T13:55:11Z) - Security Limitations of Classical-Client Delegated Quantum Computing [54.28005879611532]
A client remotely prepares a quantum state using a classical channel.
Privacy loss incurred by employing $RSP_CC$ as a sub-module is unclear.
We show that a specific $RSP_CC$ protocol can replace the quantum channel at least in some contexts.
arXiv Detail & Related papers (2020-07-03T13:15:13Z) - Secure multi-party quantum computation with few qubits [0.0]
We consider the task of secure multi-party distributed quantum computation on a quantum network.
We propose a protocol based on quantum error correction which reduces the number of necessary qubits.
We showcase our protocol on a small example for a 7-node network.
arXiv Detail & Related papers (2020-04-22T10:48:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.