Quantum Position Verification with Remote Untrusted Devices
- URL: http://arxiv.org/abs/2601.16892v1
- Date: Fri, 23 Jan 2026 16:59:13 GMT
- Title: Quantum Position Verification with Remote Untrusted Devices
- Authors: Gautam A. Kavuri, Yanbao Zhang, Abigail R. Gookin, Soumyadip Patra, Joshua C. Bienfang, Honghao Fu, Yusuf Alnawakhtha, Dileep V. Reddy, Michael D. Mazurek, Carlos Abellán, Waldimar Amaya, Morgan W. Mitchell, Sae Woo Nam, Carl A. Miller, Richard P. Mirin, Martin J. Stevens, Scott Glancy, Emanuel Knill, Lynden K. Shalm,
- Abstract summary: Many applications require or benefit from being able to securely localize remote parties.<n>In classical physics, adversaries can in principle have complete knowledge of such a party's devices.<n>We develop and experimentally demonstrate a protocol for device-independent quantum position verification.
- Score: 1.4972897100946643
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Many applications require or benefit from being able to securely localize remote parties. In classical physics, adversaries can in principle have complete knowledge of such a party's devices, and secure localization is fundamentally impossible. This limitation can be overcome with quantum technologies, but proposals to date require trusting vulnerable hardware. Here we develop and experimentally demonstrate a protocol for device-independent quantum position verification that guarantees security with only observed correlations from a loophole-free Bell test across a quantum network. The protocol certifies the position of a remote party against adversaries who, before each instance of the test, are weakly entangled, but otherwise have unlimited quantum computation and communication capabilities. Our demonstration achieves a one-dimensional localization that is 2.47(2) times smaller than the best, necessarily non-remote, classical localization protocol. Compared to such a classical protocol having identical latencies, the localization is 4.53(5) times smaller. This work anchors digital security in the physical world.
Related papers
- A Fully Device-Independent Ternary Quantum Key Distribution Protocol Based on the Impossible Colouring Game [0.59374762912328]
We propose a quantum key distribution protocol based on the two-party Impossible Colouring pseudo-telepathy game.<n>The protocol harnesses Bell inequality violations that arise from contextuality in the Kochen-Specker theorem.<n>It operates within an adequate security framework and demonstrates an improved key generation rate compared to standard quantum key distribution schemes.
arXiv Detail & Related papers (2025-05-21T14:52:31Z) - Hybrid Authentication Protocols for Advanced Quantum Networks [0.6827423171182154]
We introduce a new authentication approach that combines hardware assumptions, particularly Physical Unclonable Functions (PUFs), along with quantum properties of non-local states, such as local indistinguishability, to achieve provable security in entanglement-based protocols.<n>These protocols are suitable for implementation across various platforms, particularly photonics-based ones, and offer a practical and flexible solution to the long-standing challenge of authentication in quantum communication networks.
arXiv Detail & Related papers (2025-04-15T18:51:22Z) - Device-independent secure correlations in sequential quantum scenarios [44.99833362998488]
Device-independent quantum information is attracting significant attention, particularly for its applications in information security.<n>We propose a systematic approach to designing sequential quantum protocols for device-independent security.<n>We analytically prove that, with this systematic construction, the resulting ideal correlations are secure in the sense that they cannot be reproduced as a statistical mixture of other correlations.
arXiv Detail & Related papers (2025-03-18T16:45:20Z) - Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Unconditionally secure key distribution without quantum channel [0.76146285961466]
Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution.
We propose another key distribution scheme with unconditional security, named probability key distribution, that promises users between any two distances to generate a fixed and high secret key rate.
Non-local entangled states can be generated, identified and measured in the equivalent virtual protocol and can be used to extract secret keys.
arXiv Detail & Related papers (2024-08-24T15:13:14Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - A robust and composable device-independent protocol for oblivious transfer using (fully) untrusted quantum devices in the bounded storage model [4.644619667965337]
We present a device-independent (DI) quantum protocol between two parties for oblivious transfer (OT) using Magic Square devices.<n>After a fixed constant (real-world) time interval, referred to as DELAY, the quantum states decohere completely.<n>Our protocol has negligible (in lambda) correctness and security errors and can be implemented in the NISQ era.
arXiv Detail & Related papers (2024-04-17T11:46:36Z) - Quantum Random Access Codes Implementation for Resource Allocation and Coexistence with Classical Telecommunication [32.73124984242397]
Modern quantum networks have limited capacity to distribute resources among different users.
We experimentally test our encoding and decoding strategy from the resource allocation perspective.
By emulating a coexistent classical communication, we test the resilience of our implementation in presence of noise.
arXiv Detail & Related papers (2024-03-27T20:46:50Z) - Almost device-independent certification of GME states with minimal
measurements [41.94295877935867]
Device-independent certification of quantum states allows the characterization of quantum states present inside a device.
A major problem in this regard is to certify quantum states using minimal resources.
We consider the multipartite quantum steering scenario with an arbitrary number of parties but only one of which is trusted in the sense that the measurements performed by the trusted party are known.
arXiv Detail & Related papers (2024-02-28T17:54:55Z) - Correcting for finite statistics effects in a quantum steering experiment [33.013102271622614]
We introduce a one-sided device-independent protocol that corrects for apparent signaling effects in experimental probability distributions.<n>Our results show a significantly higher probability of violation than existing state-of-the-art inequalities.<n>This work demonstrates the power of semidefinite programming for entanglement verification and brings quantum networks closer to practical applications.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - A single-qubit position verification protocol that is secure against
multi-qubit attacks [2.3857747529378917]
We show that minimal quantum resources, in the form of a single qubit, combined with classical communication are sufficient to thwart quantum adversaries.
More precisely, we show that the adversaries using an increasing amount of entanglement can be combatted solely by increasing the number of classical bits used in the protocol.
arXiv Detail & Related papers (2021-04-13T15:48:11Z) - Composable Security for Multipartite Entanglement Verification [3.4806267677524896]
We present a composably secure protocol allowing $n$ parties to test an entanglement generation resource controlled by a possibly dishonest party.
The test consists only in local quantum operations and authenticated classical communication once a state is shared among them.
Our protocol can typically be used as a subroutine in a Quantum Internet, to securely share a GHZ state among the network before performing a communication or computation protocol.
arXiv Detail & Related papers (2020-04-16T14:33:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.