5,598 research outputs found
Improved and Formal Proposal for Device Independent Quantum Private Query
In this paper, we propose a novel Quantum Private Query (QPQ) scheme with
full Device-Independent certification. To the best of our knowledge, this is
the first time we provide such a full DI-QPQ scheme using EPR-pairs. Our
proposed scheme exploits self-testing of shared EPR-pairs along with the
self-testing of projective measurement operators in a setting where the client
and the server do not trust each other. To certify full device independence, we
exploit a strategy to self-test a particular class of POVM elements that are
used in the protocol. Further, we provide formal security analysis and obtain
an upper bound on the maximum cheating probabilities for both the dishonest
client as well as the dishonest server.Comment: 33 pages, 2 figure
The Quantum Frontier
The success of the abstract model of computation, in terms of bits, logical
operations, programming language constructs, and the like, makes it easy to
forget that computation is a physical process. Our cherished notions of
computation and information are grounded in classical mechanics, but the
physics underlying our world is quantum. In the early 80s researchers began to
ask how computation would change if we adopted a quantum mechanical, instead of
a classical mechanical, view of computation. Slowly, a new picture of
computation arose, one that gave rise to a variety of faster algorithms, novel
cryptographic mechanisms, and alternative methods of communication. Small
quantum information processing devices have been built, and efforts are
underway to build larger ones. Even apart from the existence of these devices,
the quantum view on information processing has provided significant insight
into the nature of computation and information, and a deeper understanding of
the physics of our universe and its connections with computation.
We start by describing aspects of quantum mechanics that are at the heart of
a quantum view of information processing. We give our own idiosyncratic view of
a number of these topics in the hopes of correcting common misconceptions and
highlighting aspects that are often overlooked. A number of the phenomena
described were initially viewed as oddities of quantum mechanics. It was
quantum information processing, first quantum cryptography and then, more
dramatically, quantum computing, that turned the tables and showed that these
oddities could be put to practical effect. It is these application we describe
next. We conclude with a section describing some of the many questions left for
future work, especially the mysteries surrounding where the power of quantum
information ultimately comes from.Comment: Invited book chapter for Computation for Humanity - Information
Technology to Advance Society to be published by CRC Press. Concepts
clarified and style made more uniform in version 2. Many thanks to the
referees for their suggestions for improvement
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Trading locality for time: certifiable randomness from low-depth circuits
The generation of certifiable randomness is the most fundamental
information-theoretic task that meaningfully separates quantum devices from
their classical counterparts. We propose a protocol for exponential certified
randomness expansion using a single quantum device. The protocol calls for the
device to implement a simple quantum circuit of constant depth on a 2D lattice
of qubits. The output of the circuit can be verified classically in linear
time, and is guaranteed to contain a polynomial number of certified random bits
assuming that the device used to generate the output operated using a
(classical or quantum) circuit of sub-logarithmic depth. This assumption
contrasts with the locality assumption used for randomness certification based
on Bell inequality violation or computational assumptions. To demonstrate
randomness generation it is sufficient for a device to sample from the ideal
output distribution within constant statistical distance.
Our procedure is inspired by recent work of Bravyi et al. (Science 2018), who
introduced a relational problem that can be solved by a constant-depth quantum
circuit, but provably cannot be solved by any classical circuit of
sub-logarithmic depth. We develop the discovery of Bravyi et al. into a
framework for robust randomness expansion. Our proposal does not rest on any
complexity-theoretic conjectures, but relies on the physical assumption that
the adversarial device being tested implements a circuit of sub-logarithmic
depth. Success on our task can be easily verified in classical linear time.
Finally, our task is more noise-tolerant than most other existing proposals
that can only tolerate multiplicative error, or require additional conjectures
from complexity theory; in contrast, we are able to allow a small constant
additive error in total variation distance between the sampled and ideal
distributions.Comment: 36 pages, 2 figure
Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum
properties of matter. Its aim is to develop primitives beyond the reach of
classical cryptography or to improve on existing classical implementations.
Although much of the work in this field is dedicated to quantum key
distribution (QKD), some important steps were made towards the study and
development of quantum oblivious transfer (QOT). It is possible to draw a
comparison between the application structure of both QKD and QOT primitives.
Just as QKD protocols allow quantum-safe communication, QOT protocols allow
quantum-safe computation. However, the conditions under which QOT is actually
quantum-safe have been subject to a great amount of scrutiny and study. In this
review article, we survey the work developed around the concept of oblivious
transfer in the area of theoretical quantum cryptography, with an emphasis on
some proposed protocols and their security requirements. We review the
impossibility results that daunt this primitive and discuss several quantum
security models under which it is possible to prove QOT security.Comment: 40 pages, 14 figure
A Feasible Semi-quantum Private Comparison Based on Entanglement Swapping of Bell States
Semi-quantum private comparison (SQPC) enables two classical users with
limited quantum capabilities to compare confidential information using a
semi-honest third party (TP) with full quantum power. However, entanglement
swapping, as an important property of quantum mechanics in previously proposed
SQPC protocols is usually neglected. In this paper, we propose a feasible SQPC
protocol based on the entanglement swapping of Bell states, where two classical
users do not require additional implementation of the semi-quantum key
distribution protocol to ensure the security of their private data. Security
analysis shows that our protocol is resilient to both external and internal
attacks. To verify the feasibility and correctness of the proposed SQPC
protocol, we design and simulate the corresponding quantum circuits using IBM
Qiskit. Finally, we compare and discuss the proposed protocol with previous
similar work. The results reveal that our protocol maintains high qubit
efficiency, even when entanglement swapping is employed. Consequently, our
proposed approach showcases the potential applications of entanglement swapping
in the field of semi-quantum cryptography.Comment: 17 pages, 6 figures. arXiv admin note: text overlap with
arXiv:2210.0342
- …