57,713 research outputs found
Generalized self-testing and the security of the 6-state protocol
Self-tested quantum information processing provides a means for doing useful
information processing with untrusted quantum apparatus. Previous work was
limited to performing computations and protocols in real Hilbert spaces, which
is not a serious obstacle if one is only interested in final measurement
statistics being correct (for example, getting the correct factors of a large
number after running Shor's factoring algorithm). This limitation was shown by
McKague et al. to be fundamental, since there is no way to experimentally
distinguish any quantum experiment from a special simulation using states and
operators with only real coefficients.
In this paper, we show that one can still do a meaningful self-test of
quantum apparatus with complex amplitudes. In particular, we define a family of
simulations of quantum experiments, based on complex conjugation, with two
interesting properties. First, we are able to define a self-test which may be
passed only by states and operators that are equivalent to simulations within
the family. This extends work of Mayers and Yao and Magniez et al. in
self-testing of quantum apparatus, and includes a complex measurement. Second,
any of the simulations in the family may be used to implement a secure 6-state
QKD protocol, which was previously not known to be implementable in a
self-tested framework.Comment: To appear in proceedings of TQC 201
Authenticated teleportation with one-sided trust
We introduce a protocol for authenticated teleportation, which can be proven
secure even when the receiver does not trust their measurement devices, and is
experimentally accessible. We use the technique of self-testing from the
device-independent approach to quantum information, where we can characterise
quantum states and measurements from the exhibited classical correlations
alone. First, we derive self-testing bounds for the Bell state and Pauli
measurements, that are robust enough to be implemented in
the lab. Then, we use these to determine a lower bound on the fidelity of an
untested entangled state to be used for teleportation. Finally, we apply our
results to propose an experimentally feasible protocol for one-sided
device-independent authenticated teleportation. This can be interpreted as a
first practical authentication of a quantum channel, with additional one-sided
device-independence.Comment: published versio
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Communication Complexity and Secure Function Evaluation
We suggest two new methodologies for the design of efficient secure
protocols, that differ with respect to their underlying computational models.
In one methodology we utilize the communication complexity tree (or branching
for f and transform it into a secure protocol. In other words, "any function f
that can be computed using communication complexity c can be can be computed
securely using communication complexity that is polynomial in c and a security
parameter". The second methodology uses the circuit computing f, enhanced with
look-up tables as its underlying computational model. It is possible to
simulate any RAM machine in this model with polylogarithmic blowup. Hence it is
possible to start with a computation of f on a RAM machine and transform it
into a secure protocol.
We show many applications of these new methodologies resulting in protocols
efficient either in communication or in computation. In particular, we
exemplify a protocol for the "millionaires problem", where two participants
want to compare their values but reveal no other information. Our protocol is
more efficient than previously known ones in either communication or
computation
- …