668 research outputs found
Covert Quantum Internet
We apply covert quantum communication based on entanglement generated from
the Minkowski vacuum to the setting of quantum computation and quantum
networks. Our approach hides the generation and distribution of entanglement in
quantum networks by taking advantage of relativistic quantum effects. We devise
a suite of covert quantum teleportation protocols that utilize the shared
entanglement, local operations, and covert classical communication to transfer
or process quantum information in stealth. As an application of our covert
suite, we construct two prominent examples of measurement-based quantum
computation, namely the teleportation-based quantum computer and the one-way
quantum computer. In the latter case we explore the covert generation of graph
states, and subsequently outline a protocol for the covert implementation of
universal blind quantum computation.Comment: 9 pages, 2 figure
qBitcoin: A Peer-to-Peer Quantum Cash System
A decentralized online quantum cash system, called qBitcoin, is given. We
design the system which has great benefits of quantization in the following
sense. Firstly, quantum teleportation technology is used for coin transaction,
which prevents from the owner of the coin keeping the original coin data even
after sending the coin to another. This was a main problem in a classical
circuit and a blockchain was introduced to solve this issue. In qBitcoin, the
double-spending problem never happens and its security is guaranteed
theoretically by virtue of quantum information theory. Making a block is time
consuming and the system of qBitcoin is based on a quantum chain, instead of
blocks. Therefore a payment can be completed much faster than Bitcoin. Moreover
we employ quantum digital signature so that it naturally inherits properties of
peer-to-peer (P2P) cash system as originally proposed in Bitcoin.Comment: 11 pages, 2 figure
Blind quantum computation protocol in which Alice only makes measurements
Blind quantum computation is a new secure quantum computing protocol which
enables Alice who does not have sufficient quantum technology to delegate her
quantum computation to Bob who has a fully-fledged quantum computer in such a
way that Bob cannot learn anything about Alice's input, output, and algorithm.
In previous protocols, Alice needs to have a device which generates quantum
states, such as single-photon states. Here we propose another type of blind
computing protocol where Alice does only measurements, such as the polarization
measurements with a threshold detector. In several experimental setups, such as
optical systems, the measurement of a state is much easier than the generation
of a single-qubit state. Therefore our protocols ease Alice's burden.
Furthermore, the security of our protocol is based on the no-signaling
principle, which is more fundamental than quantum physics. Finally, our
protocols are device independent in the sense that Alice does not need to trust
her measurement device in order to guarantee the security.Comment: 9 pages, 3 figure
- …