Cryptographic Fragility of Standard Quantum Repeater Protocols
- URL: http://arxiv.org/abs/2602.23048v1
- Date: Thu, 26 Feb 2026 14:30:03 GMT
- Title: Cryptographic Fragility of Standard Quantum Repeater Protocols
- Authors: Abhishek Sadhu, Sharu Theresa Jose,
- Abstract summary: We show that the proposed quantum Internet relies on repeater protocols designed under the assumption of characterizable noise.<n>We propose a Cryptographic Network Stack centered on a trapdoor verification protocol to address these vulnerabilities.
- Score: 1.5469452301122173
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The security of the proposed quantum Internet relies on repeater protocols designed under the assumption of stochastic, characterizable noise. We demonstrate that in adversarial environments this assumption induces performance vulnerabilities for computationally bounded repeater nodes. We show that the standard BBPSSW distillation protocol recursively purifies error syndromes rather than entanglement. This leads to a state of low fidelity despite diagnostic metrics indicating perfect convergence. Moreover, we show that the verifier cannot check the adversarial influence via the maximum likelihood estimation algorithm since it is blind to computationally bounded observers. To address these vulnerabilities, we propose a Cryptographic Network Stack centered on a trapdoor verification protocol. The protocol exploits private randomness to restore operational stability without requiring channel characterization.
Related papers
- Verifiable blind observable estimation: A composably secure protocol for near-term quantum advantage tasks [5.1287945894217355]
We introduce a protocol that efficiently verifies observable estimation performed on an untrusted quantum machine.<n>More precisely, it guarantees that the computed estimate is within some $epsilon>0$ of the true expectation value or else it aborts.
arXiv Detail & Related papers (2025-10-09T17:56:15Z) - COIN: Uncertainty-Guarding Selective Question Answering for Foundation Models with Provable Risk Guarantees [51.5976496056012]
COIN is an uncertainty-guarding selection framework that calibrates statistically valid thresholds to filter a single generated answer per question.<n>COIN estimates the empirical error rate on a calibration set and applies confidence interval methods to establish a high-probability upper bound on the true error rate.<n>We demonstrate COIN's robustness in risk control, strong test-time power in retaining admissible answers, and predictive efficiency under limited calibration data.
arXiv Detail & Related papers (2025-06-25T07:04:49Z) - Quantum dialogue through non-destructive discrimination of cluster state [0.6749750044497732]
We propose a quantum dialogue protocol that uses the non-destructive discrimination (NDD) of five qubit cluster states.<n>The proposed protocol is a measurement-based protocol, where ancilla qubits are used to perform measurement on the state without destroying its entanglement.
arXiv Detail & Related papers (2025-06-05T10:16:09Z) - Error minimization for fidelity estimation of GHZ states with arbitrary noise [0.32634122554913997]
This work studies a scenario in which multiple nodes share noisy Greenberger-Horne-Zeilinger (GHZ) states.
Due to the collapsing nature of quantum measurements, the nodes randomly sample a subset of noisy GHZ states for measurement.
The proposed protocol achieves the minimum mean squared estimation error in a challenging scenario characterized by arbitrary noise.
arXiv Detail & Related papers (2024-08-18T09:02:17Z) - Optimizing state-discrimination receivers for continuous-variable
quantum key distribution over a wiretap channel [1.3108652488669736]
We address a continuous-variable quantum key distribution protocol employing quaternary phase-shift-keying (QPSK) of coherent states.
We consider a pure-loss quantum wiretap channel, in which a possible eavesdropper is limited to collect the sole channel losses.
arXiv Detail & Related papers (2023-06-20T12:26:06Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Demonstration of Entanglement-Enhanced Covert Sensing [3.516093069612194]
We present the theory and experiment for entanglement-enhanced covert sensing.
We show that entanglement offers a performance boost in estimating the imparted phase by a probed object.
Our work is expected to create ample opportunities for quantum information processing at unprecedented security and performance levels.
arXiv Detail & Related papers (2022-05-25T16:20:34Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.