10 research outputs found
Quantum Solution of Coordination Problems
We present a quantum solution to coordination problems that can be
implemented with present technologies. It provides an alternative to existing
approaches, which rely on explicit communication, prior commitment or trusted
third parties. This quantum mechanism applies to a variety of scenarios for
which existing approaches are not feasible
Quantum Solution of Coordination Problems
We present a quantum solution to coordination problems that can be implemented with present technologies. It provides an alternative to existing approaches, which rely on explicit communication, prior commitment or trusted third parties. This quantum mechanism applies to a variety of scenarios for which existing approaches are not feasible.game theory, quantum games
Private Database Queries Using Quantum States with Limited Coherence Times
We describe a method for private database queries using exchange of quantum
states with bits encoded in mutually incompatible bases. For technology with
limited coherence time, the database vendor can announce the encoding after a
suitable delay to allow the user to privately learn one of two items in the
database without the ability to also definitely infer the second item. This
quantum approach also allows the user to choose to learn other functions of the
items, such as the exclusive-or of their bits, but not to gain more information
than equivalent to learning one item, on average. This method is especially
useful for items consisting of a few bits by avoiding the substantial overhead
of conventional cryptographic approaches.Comment: extended to generalized (POVM) measurement
Privacy and Data Balkanization: Circumventing the Barriers
The rapid growth in digital data forms the basis for a wide range of new services and research, e.g, large-scale medical studies. At the same time, increasingly restrictive privacy concerns and laws are leading to significant overhead in arranging for sharing or combining different data sets to obtain these benefits. For new applications, where the benefit of combined data is not yet clear, this overhead can inhibit organizations from even trying to determine whether they can mutually benefit from sharing their data. In this paper, we discuss techniques to overcome this difficulty by employing private information transfer to determine whether there is a benefit from sharing data, and whether there is room to negotiate acceptable prices. These techniques involve cryptographic protocols. While currently considered secure, these protocols are potentially vulnerable to the development of quantum technology, particularly for ensuring privacy over significant periods of time into the future. To mitigate this concern, we describe how developments in practical quantum technology can improve the security of these protocols