Quantum position verification in one shot: parallel repetition of the $f$-BB84 and $f$-routing protocols
- URL: http://arxiv.org/abs/2503.09544v1
- Date: Wed, 12 Mar 2025 17:00:32 GMT
- Title: Quantum position verification in one shot: parallel repetition of the $f$-BB84 and $f$-routing protocols
- Authors: Llorenç Escolà-Farràs, Florian Speelman,
- Abstract summary: We show that security for a one-round protocol can rely on the size of the classical information rather than quantum resources.<n>We establish parallel repetition of the $f$-BB84 and $f$-routing QPV protocols.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum position verification (QPV) aims to verify an untrusted prover's location by timing communication with them. To reduce uncertainty, it is desirable for this verification to occur in a single round. However, previous protocols achieving one-round secure QPV had critical drawbacks: attackers pre-sharing an EPR pair per qubit could perfectly break them, and their security depended on quantum information traveling at the speed of light in vacuum, a major experimental challenge in quantum networks. In this work, we prove that a single round of interaction suffices for secure position verification while overcoming these limitations. We show that security for a one-round protocol can rely only on the size of the classical information rather than quantum resources, making implementation more feasible, even with a qubit error tolerance of up to 3.6%, which is experimentally achievable with current technology -- and showing that the timing constraints have to apply only to classical communication. In short, we establish parallel repetition of the $f$-BB84 and $f$-routing QPV protocols. As a consequence of our techniques, we also demonstrate an order-of-magnitude improvement in the error tolerance for the sequential repetition version of these protocols, compared to the previous bounds of Nature Physics 18, 623-626 (2022).
Related papers
- Bayesian Quantum Amplitude Estimation [49.1574468325115]
We introduce BAE, a noise-aware Bayesian algorithm for quantum amplitude estimation.<n>We show that BAE achieves Heisenberg-limited estimation and benchmark it against other approaches.
arXiv Detail & Related papers (2024-12-05T18:09:41Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Continuous-variable Quantum Position Verification secure against entangled attackers [0.6011824091708076]
We show that a quantum position verification protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement.
We show that the protocol remains secure for certain attenuation and excess noise.
arXiv Detail & Related papers (2024-04-22T15:09:36Z) - Making Existing Quantum Position Verification Protocols Secure Against
Arbitrary Transmission Loss [0.889974344676093]
In quantum position verification (QPV) protocols, even relatively small loss rates can compromise security.
We modify the usual structure of QPV protocols and prove that this modification makes the potentially high transmission loss between the verifiers security-irrelevant.
We show possible implementations of the required photon presence detection, making c-$mathrmQPV_mathrmBB84f$ a protocol that solves all major practical issues in QPV.
arXiv Detail & Related papers (2023-12-19T21:38:10Z) - Security of a Continuous-Variable based Quantum Position Verification
Protocol [0.0]
We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
arXiv Detail & Related papers (2023-08-08T09:56:38Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Reliable Quantum Communications based on Asymmetry in Distillation and Coding [35.693513369212646]
We address the problem of reliable provision of entangled qubits in quantum computing schemes.
We combine indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC)
Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
arXiv Detail & Related papers (2023-05-01T17:13:23Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Single-qubit loss-tolerant quantum position verification protocol secure against entangled attackers [0.0]
We study the exact loss-tolerance of the most popular protocol for QPV, which is based on BB84 states.<n>We show how these results transfer to the variant protocol which combines $n$ bits of classical information with a single qubit.
arXiv Detail & Related papers (2022-12-07T14:39:56Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Towards practical and error-robust quantum position verification [0.0]
Loss of inputs can be detrimental to the security of quantum position verification (QPV) protocols.
We propose a new fully loss-tolerant protocol QPV$_textsfSWAP$, based on the SWAP test.
We show that the protocol remains secure even if unentangled attackers are allowed to quantum communicate.
arXiv Detail & Related papers (2021-06-24T11:10:44Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.