6 research outputs found
Conference Key Agreement and Quantum Sharing of Classical Secrets with Noisy GHZ States
We propose a wide class of distillation schemes for multi-partite entangled
states that are CSS-states. Our proposal provides not only superior efficiency,
but also new insights on the connection between CSS-states and bipartite graph
states. We then consider the applications of our distillation schemes for two
cryptographic tasks--namely, (a) conference key agreement and (b) quantum
sharing of classical secrets. In particular, we construct
``prepare-and-measure'' protocols. Also we study the yield of those protocols
and the threshold value of the fidelity above which the protocols can function
securely. Surprisingly, our protocols will function securely even when the
initial state does not violate the standard Bell-inequalities for GHZ states.
Experimental realization involving only bi-partite entanglement is also
suggested.Comment: 5 pages, to appear in Proc. 2005 IEEE International Symposium on
Information Theory (ISIT 2005, Adelaide, Australia
Quantum multiparty key distribution protocol without use of entanglement
We propose a quantum key distribution (QKD) protocol that enables three
parties agree at once on a shared common random bit string in presence of an
eavesdropper without use of entanglement. We prove its unconditional security
and analyze the key rate.Comment: 8 pages, no figur
Open-destination measurement-device-independent quantum key distribution network
Quantum key distribution (QKD) networks hold promise for sharing secure
randomness over multi-partities. Most existing QKD network schemes and
demonstrations are based on trusted relays or limited to point-to-point
scenario. Here, we propose a flexible and extensible scheme named as
open-destination measurement-device-independent QKD network. The scheme enjoys
security against untrusted relays and all detector side-channel attacks.
Particularly, any users can accomplish key distribution under assistance of
others in the network. As an illustration, we show in detail a four-user
network where two users establish secure communication and present realistic
simulations by taking into account imperfections of both sources and detectors.Comment: 13 pages, 5 figure
Genuine multipartite entanglement measures based on multi-party teleportation capability
Quantifying entanglement is vital to understand entanglement as a resource in
quantum information processing, and many entanglement measures have been
suggested for this purpose. When mathematically defining an entanglement
measure, we should consider the distinguishability between entangled and
separable states, the invariance under local transformation, the monotonicity
under local operations and classical communication, and the convexity. These
are reasonable requirements but may be insufficient, in particular when taking
into account the usefulness of quantum states in multi-party quantum
information processing. Therefore, if we want to investigate multipartite
entanglement as a resource, then it can be necessary to consider the usefulness
of quantum states in multi-party quantum information processing when we define
a multipartite entanglement measure. In this paper, we define new multipartite
entanglement measures for three-qubit systems based on the three-party
teleportation capability, and show that these entanglement measures satisfy the
requirements for being genuine multipartite entanglement measures. We also
generalize our entanglement measures for -qubit systems, where ,
and discuss that these quantities may be good candidates to measure genuine
multipartite entanglement.Comment: 14 pages, 2 figure
Enumerating all bilocal Clifford distillation protocols through symmetry reduction
Entanglement distillation is an essential building block in quantum
communication protocols. Here, we study the class of near-term implementable
distillation protocols that use bilocal Clifford operations followed by a
single round of communication. We introduce tools to enumerate and optimise
over all protocols for up to (not necessarily equal) Bell-diagonal states
using a commodity desktop computer. Furthermore, by exploiting the symmetries
of the input states, we find all protocols for up to copies of a Werner
state. For the latter case, we present circuits that achieve the highest
fidelity. These circuits have modest depth and number of two-qubit gates. Our
results are based on a correspondence between distillation protocols and double
cosets of the symplectic group, and improve on previously known protocols.Comment: 13 pages main text, 5 pages appendices, 8 figure