Quantum-private distributed sensing
- URL: http://arxiv.org/abs/2410.00970v3
- Date: Fri, 10 Oct 2025 18:00:05 GMT
- Title: Quantum-private distributed sensing
- Authors: Joseph Ho, Jonathan W. Webb, Russell M. J. Brooks, Federico Grasselli, Erik Gauger, Alessandro Fedrizzi,
- Abstract summary: Quantum networks can enhance both security and privacy conditions for multi-user communication, delegated computation, and distributed sensing tasks.<n>An example quantum protocol is private parameter estimation (PPE) where only the aggregate information is accessible while individual sensor data remain confidential.<n>We implement the PPE protocol by distributing a three-photon Greenberger-Horne-Zeilinger (GHZ) state, among three sensors, which is verified using stabilizer measurements to establish privacy and precision bounds for the sensing task.
- Score: 35.42935514723487
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum networks can enhance both security and privacy conditions for multi-user communication, delegated computation, and distributed sensing tasks. An example quantum protocol is private parameter estimation (PPE) where only the aggregate information is accessible while individual sensor data remain confidential. Specifically, the protocol enables the estimation of a global function of remote sensor parameters without revealing local parameters to any entity. We implement the PPE protocol by distributing a three-photon Greenberger-Horne-Zeilinger (GHZ) state, among three sensors, which is verified using stabilizer measurements to establish privacy and precision bounds for the sensing task. We demonstrate Heisenberg-limited precision scaling of the global parameter while suppressing the metrological information of the local parameters by up to three orders of magnitude. This work, which integrates privacy in distributed quantum sensing, marks a crucial step towards developing advanced quantum-secure-and-private protocols in complex quantum networks.
Related papers
- Universal Operational Privacy in Distributed Quantum Sensing [3.758871793953489]
We introduce a universal operational privacy framework for distributed quantum sensing networks.<n>A protocol-independent criterion ensures that no information about individual parameters is accessible to untrusted parties.<n>Our results establish universal operational constraints governing privacy in distributed quantum sensing networks.
arXiv Detail & Related papers (2026-01-27T05:17:46Z) - Composable privacy of networked quantum sensing [1.0312968200748116]
Networks of sensors are a promising scheme to deliver the benefits of quantum technologies in coming years.<n>Recent work has explored the privacy of these schemes, meaning that local parameters can be kept secret while a joint function of these is estimated by the network.
arXiv Detail & Related papers (2025-10-07T18:00:04Z) - Privacy in continuous-variable distributed quantum sensing [0.6745502291821954]
We introduce and analyse a protocol for distributed quantum sensing in the continuous-variable regime.<n>We show that the average phase can be estimated with high precision, exhibiting Heisenberg scaling in the total photon number.<n>Although complete privacy is unattainable for finite squeezing in multi-party settings, it emerges in the large-squeezing limit.
arXiv Detail & Related papers (2025-09-15T18:06:48Z) - Anonymous and private parameter estimation in networks of quantum sensors [1.099532646524593]
In quantum networks, distributed quantum sensing has emerged as a powerful use case.<n>We develop a new protocol combining the different cryptographic functionalities of anonymity and privacy for the task of distributed parameter estimation.
arXiv Detail & Related papers (2025-07-01T18:02:51Z) - Communication-Efficient and Privacy-Adaptable Mechanism for Federated Learning [54.20871516148981]
We introduce the Communication-Efficient and Privacy-Adaptable Mechanism (CEPAM)<n>CEPAM achieves communication efficiency and privacy protection simultaneously.<n>We theoretically analyze the privacy guarantee of CEPAM and investigate the trade-offs among user privacy and accuracy of CEPAM.
arXiv Detail & Related papers (2025-01-21T11:16:05Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - Error minimization for fidelity estimation of GHZ states with arbitrary noise [0.32634122554913997]
This work studies a scenario in which multiple nodes share noisy Greenberger-Horne-Zeilinger (GHZ) states.
Due to the collapsing nature of quantum measurements, the nodes randomly sample a subset of noisy GHZ states for measurement.
The proposed protocol achieves the minimum mean squared estimation error in a challenging scenario characterized by arbitrary noise.
arXiv Detail & Related papers (2024-08-18T09:02:17Z) - Private and Robust States for Distributed Quantum Sensing [1.2499537119440245]
Distributed quantum sensing enables the estimation of multiple parameters encoded in spatially separated probes.
In such settings it is natural to not want to give away more information than is necessary.
We use the concept of privacy with respect to a function, ensuring that only information about the target function is available to all the parties.
arXiv Detail & Related papers (2024-07-31T15:46:50Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - A Randomized Approach for Tight Privacy Accounting [63.67296945525791]
We propose a new differential privacy paradigm called estimate-verify-release (EVR)
EVR paradigm first estimates the privacy parameter of a mechanism, then verifies whether it meets this guarantee, and finally releases the query output.
Our empirical evaluation shows the newly proposed EVR paradigm improves the utility-privacy tradeoff for privacy-preserving machine learning.
arXiv Detail & Related papers (2023-04-17T00:38:01Z) - Breaking the Communication-Privacy-Accuracy Tradeoff with
$f$-Differential Privacy [51.11280118806893]
We consider a federated data analytics problem in which a server coordinates the collaborative data analysis of multiple users with privacy concerns and limited communication capability.
We study the local differential privacy guarantees of discrete-valued mechanisms with finite output space through the lens of $f$-differential privacy (DP)
More specifically, we advance the existing literature by deriving tight $f$-DP guarantees for a variety of discrete-valued mechanisms.
arXiv Detail & Related papers (2023-02-19T16:58:53Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Demonstration of Entanglement-Enhanced Covert Sensing [3.516093069612194]
We present the theory and experiment for entanglement-enhanced covert sensing.
We show that entanglement offers a performance boost in estimating the imparted phase by a probed object.
Our work is expected to create ample opportunities for quantum information processing at unprecedented security and performance levels.
arXiv Detail & Related papers (2022-05-25T16:20:34Z) - Byzantine-Robust Federated Learning with Optimal Statistical Rates and
Privacy Guarantees [123.0401978870009]
We propose Byzantine-robust federated learning protocols with nearly optimal statistical rates.
We benchmark against competing protocols and show the empirical superiority of the proposed protocols.
Our protocols with bucketing can be naturally combined with privacy-guaranteeing procedures to introduce security against a semi-honest server.
arXiv Detail & Related papers (2022-05-24T04:03:07Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Steering-based randomness certification with squeezed states and
homodyne measurements [0.0]
We present a scheme for quantum randomness certification based on quantum steering.
The protocol is one-sided device independent, providing high security, but requires only states and measurements that are simple to realise on quantum optics platforms.
arXiv Detail & Related papers (2021-11-11T13:05:18Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.