Composable privacy of networked quantum sensing
- URL: http://arxiv.org/abs/2510.06326v1
- Date: Tue, 07 Oct 2025 18:00:04 GMT
- Title: Composable privacy of networked quantum sensing
- Authors: Naomi R. Solomons, Damian Markham,
- Abstract summary: Networks of sensors are a promising scheme to deliver the benefits of quantum technologies in coming years.<n>Recent work has explored the privacy of these schemes, meaning that local parameters can be kept secret while a joint function of these is estimated by the network.
- Score: 1.0312968200748116
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Networks of sensors are a promising scheme to deliver the benefits of quantum technologies in coming years, offering enhanced precision and accuracy for distributed metrology through the use of large entangled states. Recent work has additionally explored the privacy of these schemes, meaning that local parameters can be kept secret while a joint function of these is estimated by the network. In this work, we use the abstract cryptography framework to relate the two proposed definitions of quasi-privacy, showing that both are composable, which enables the protocol to be securely included as a sub-routine to other schemes. We give an explicit example that estimating the mean of a set of parameters using GHZ states is composably fully secure.
Related papers
- Universal Operational Privacy in Distributed Quantum Sensing [3.758871793953489]
We introduce a universal operational privacy framework for distributed quantum sensing networks.<n>A protocol-independent criterion ensures that no information about individual parameters is accessible to untrusted parties.<n>Our results establish universal operational constraints governing privacy in distributed quantum sensing networks.
arXiv Detail & Related papers (2026-01-27T05:17:46Z) - AmbShield: Enhancing Physical Layer Security with Ambient Backscatter Devices against Eavesdroppers [69.56534335936534]
AmbShield is an AmBD-assisted PLS scheme that leverages naturally distributed AmBDs to simultaneously strengthen the legitimate channel and degrade eavesdroppers'<n>In AmbShield, AmBDs are exploited as friendly jammers that randomly backscatter to create interference at eavesdroppers, and as passive relays that backscatter the desired signal to enhance the capacity of legitimate devices.
arXiv Detail & Related papers (2026-01-14T20:56:50Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Anonymous and private parameter estimation in networks of quantum sensors [1.099532646524593]
In quantum networks, distributed quantum sensing has emerged as a powerful use case.<n>We develop a new protocol combining the different cryptographic functionalities of anonymity and privacy for the task of distributed parameter estimation.
arXiv Detail & Related papers (2025-07-01T18:02:51Z) - Faithful and secure distributed quantum sensing under general-coherent attacks [0.0]
We introduce, theoretically analyze, and experimentally demonstrate single- and two-way protocols for distributed sensing.<n>We introduce a safety-threshold mechanism that allows the protocol to proceed in low-noise cases and quantifying the potential tampering with respect to the ideal estimation procedure.<n>We demonstrate our protocols in a photonic-based implementation, observing that the possibility of guaranteeing a safety threshold may come at a significant price in terms of the estimation bias.
arXiv Detail & Related papers (2025-05-05T12:48:41Z) - Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - Quantum-private distributed sensing [35.42935514723487]
Quantum networks can enhance both security and privacy conditions for multi-user communication, delegated computation, and distributed sensing tasks.<n>An example quantum protocol is private parameter estimation (PPE) where only the aggregate information is accessible while individual sensor data remain confidential.<n>We implement the PPE protocol by distributing a three-photon Greenberger-Horne-Zeilinger (GHZ) state, among three sensors, which is verified using stabilizer measurements to establish privacy and precision bounds for the sensing task.
arXiv Detail & Related papers (2024-10-01T18:00:08Z) - Secure quantum-enhanced measurements on a network of sensors [0.0]
Two-party secure quantum remote sensing (SQRS) protocols enable quantum-enhanced measurements at remote locations with guaranteed security against eavesdroppers.
This idea can be scaled up to networks of nodes where one party can directly measure functions of parameters at the different nodes using entangled states.
Here we show how this problem can be overcome in a hybrid protocol that utilises both entangled and separable states to achieve quantum-enhanced measurement precision and security on networks of any size.
arXiv Detail & Related papers (2024-06-27T15:58:38Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Differentially Private Federated Bayesian Optimization with Distributed
Exploration [48.9049546219643]
We introduce differential privacy (DP) into the training of deep neural networks through a general framework for adding DP to iterative algorithms.
We show that DP-FTS-DE achieves high utility (competitive performance) with a strong privacy guarantee.
We also use real-world experiments to show that DP-FTS-DE induces a trade-off between privacy and utility.
arXiv Detail & Related papers (2021-10-27T04:11:06Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Verifying Probabilistic Specifications with Functional Lagrangians [47.81366702121604]
We propose a framework for verifying input-output specifications of neural networks using functional Lagrange multipliers.
We show that the framework provably leads to tight verification when a sufficiently flexible class of functional multipliers is chosen.
arXiv Detail & Related papers (2021-02-18T17:00:40Z) - CryptoSPN: Privacy-preserving Sum-Product Network Inference [84.88362774693914]
We present a framework for privacy-preserving inference of sum-product networks (SPNs)
CryptoSPN achieves highly efficient and accurate inference in the order of seconds for medium-sized SPNs.
arXiv Detail & Related papers (2020-02-03T14:49:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.