1,032 research outputs found
N-qubit entanglement via the -type collective interaction
We investigate quantum correlations of the -qubit states via a collective
pseudo-spin interaction () on arbitrary pure separable states
for a given interval of time. Based on this dynamical generation of the
-qubit maximal entangled states, a quantum secret sharing protocol with
continuous classical secrets is developed.Comment: 12 pages, 3 figure
A Simplified Hierarchical Dynamic Quantum Secret Sharing Protocol with Added Features
Generalizing the notion of dynamic quantum secret sharing (DQSS), a
simplified protocol for hierarchical dynamic quantum secret sharing (HDQSS) is
proposed and it is shown that the protocol can be implemented using any
existing protocol of quantum key distribution, quantum key agreement or secure
direct quantum communication. The security of this proposed protocol against
eavesdropping and collusion attacks is discussed with specific attention
towards the issues related to the composability of the subprotocols that
constitute the proposed protocol. The security and qubit efficiency of the
proposed protocol is also compared with that of other existing protocols of
DQSS. Further, it is shown that it is possible to design a semi-quantum
protocol of HDQSS and in principle, the protocols of HDQSS can be implemented
using any quantum state. It is also noted that the completely
orthogonal-state-based realization of HDQSS protocol is possible and that HDQSS
can be experimentally realized using a large number of alternative approaches.Comment: 9 pages, 1 figur
Classical Knowledge for Quantum Security
We propose a decision procedure for analysing security of quantum
cryptographic protocols, combining a classical algebraic rewrite system for
knowledge with an operational semantics for quantum distributed computing. As a
test case, we use our procedure to reason about security properties of a
recently developed quantum secret sharing protocol that uses graph states. We
analyze three different scenarios based on the safety assumptions of the
classical and quantum channels and discover the path of an attack in the
presence of an adversary. The epistemic analysis that leads to this and similar
types of attacks is purely based on our classical notion of knowledge.Comment: extended abstract, 13 page
When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance
We show that it is possible to achieve information theoretic location privacy
for secondary users (SUs) in database-driven cognitive radio networks (CRNs)
with an end-to-end delay less than a second, which is significantly better than
that of the existing alternatives offering only a computational privacy. This
is achieved based on a keen observation that, by the requirement of Federal
Communications Commission (FCC), all certified spectrum databases synchronize
their records. Hence, the same copy of spectrum database is available through
multiple (distinct) providers. We harness the synergy between multi-server
private information retrieval (PIR) and database- driven CRN architecture to
offer an optimal level of privacy with high efficiency by exploiting this
observation. We demonstrated, analytically and experimentally with deployments
on actual cloud systems that, our adaptations of multi-server PIR outperform
that of the (currently) fastest single-server PIR by a magnitude of times with
information theoretic security, collusion resiliency, and fault-tolerance
features. Our analysis indicates that multi-server PIR is an ideal
cryptographic tool to provide location privacy in database-driven CRNs, in
which the requirement of replicated databases is a natural part of the system
architecture, and therefore SUs can enjoy all advantages of multi-server PIR
without any additional architectural and deployment costs.Comment: 10 pages, double colum
Recursive quantum repeater networks
Internet-scale quantum repeater networks will be heterogeneous in physical
technology, repeater functionality, and management. The classical control
necessary to use the network will therefore face similar issues as Internet
data transmission. Many scalability and management problems that arose during
the development of the Internet might have been solved in a more uniform
fashion, improving flexibility and reducing redundant engineering effort.
Quantum repeater network development is currently at the stage where we risk
similar duplication when separate systems are combined. We propose a unifying
framework that can be used with all existing repeater designs. We introduce the
notion of a Quantum Recursive Network Architecture, developed from the emerging
classical concept of 'recursive networks', extending recursive mechanisms from
a focus on data forwarding to a more general distributed computing request
framework. Recursion abstracts independent transit networks as single relay
nodes, unifies software layering, and virtualizes the addresses of resources to
improve information hiding and resource management. Our architecture is useful
for building arbitrary distributed states, including fundamental distributed
states such as Bell pairs and GHZ, W, and cluster states.Comment: 14 page
Design and experimental realization of an optimal scheme for teleportion of an -qubit quantum state
An explicit scheme (quantum circuit) is designed for the teleportation of an
-qubit quantum state. It is established that the proposed scheme requires an
optimal amount of quantum resources, whereas larger amount of quantum resources
has been used in a large number of recently reported teleportation schemes for
the quantum states which can be viewed as special cases of the general
-qubit state considered here. A trade off between our knowledge about the
quantum state to be teleported and the amount of quantum resources required for
the same is observed. A proof of principle experimental realization of the
proposed scheme (for a 2-qubit state) is also performed using 5-qubit
superconductivity-based IBM quantum computer. Experimental results show that
the state has been teleported with high fidelity. Relevance of the proposed
teleportation scheme has also been discussed in the context of controlled,
bidirectional, and bidirectional-controlled state teleportation.Comment: 11 pages 4 figure
- …