17,092 research outputs found
Partial Order Reduction for Security Protocols
Security protocols are concurrent processes that communicate using
cryptography with the aim of achieving various security properties. Recent work
on their formal verification has brought procedures and tools for deciding
trace equivalence properties (e.g., anonymity, unlinkability, vote secrecy) for
a bounded number of sessions. However, these procedures are based on a naive
symbolic exploration of all traces of the considered processes which,
unsurprisingly, greatly limits the scalability and practical impact of the
verification tools.
In this paper, we overcome this difficulty by developing partial order
reduction techniques for the verification of security protocols. We provide
reduced transition systems that optimally eliminate redundant traces, and which
are adequate for model-checking trace equivalence properties of protocols by
means of symbolic execution. We have implemented our reductions in the tool
Apte, and demonstrated that it achieves the expected speedup on various
protocols
Quantum network communication -- the butterfly and beyond
We study the k-pair communication problem for quantum information in networks
of quantum channels. We consider the asymptotic rates of high fidelity quantum
communication between specific sender-receiver pairs. Four scenarios of
classical communication assistance (none, forward, backward, and two-way) are
considered. (i) We obtain outer and inner bounds of the achievable rate regions
in the most general directed networks. (ii) For two particular networks
(including the butterfly network) routing is proved optimal, and the free
assisting classical communication can at best be used to modify the directions
of quantum channels in the network. Consequently, the achievable rate regions
are given by counting edge avoiding paths, and precise achievable rate regions
in all four assisting scenarios can be obtained. (iii) Optimality of routing
can also be proved in classes of networks. The first class consists of directed
unassisted networks in which (1) the receivers are information sinks, (2) the
maximum distance from senders to receivers is small, and (3) a certain type of
4-cycles are absent, but without further constraints (such as on the number of
communicating and intermediate parties). The second class consists of arbitrary
backward-assisted networks with 2 sender-receiver pairs. (iv) Beyond the k-pair
communication problem, observations are made on quantum multicasting and a
static version of network communication related to the entanglement of
assistance.Comment: 15 pages, 17 figures. Final versio
A classical analogue of entanglement
We show that quantum entanglement has a very close classical analogue, namely
secret classical correlations. The fundamental analogy stems from the behavior
of quantum entanglement under local operations and classical communication and
the behavior of secret correlations under local operations and public
communication. A large number of derived analogies follow. In particular
teleportation is analogous to the one-time-pad, the concept of ``pure state''
exists in the classical domain, entanglement concentration and dilution are
essentially classical secrecy protocols, and single copy entanglement
manipulations have such a close classical analog that the majorization results
are reproduced in the classical setting. This analogy allows one to import
questions from the quantum domain into the classical one, and vice-versa,
helping to get a better understanding of both. Also, by identifying classical
aspects of quantum entanglement it allows one to identify those aspects of
entanglement which are uniquely quantum mechanical.Comment: 13 pages, references update
- …