45,366 research outputs found
Framework for classifying logical operators in stabilizer codes
Entanglement, as studied in quantum information science, and non-local
quantum correlations, as studied in condensed matter physics, are fundamentally
akin to each other. However, their relationship is often hard to quantify due
to the lack of a general approach to study both on the same footing. In
particular, while entanglement and non-local correlations are properties of
states, both arise from symmetries of global operators that commute with the
system Hamiltonian. Here, we introduce a framework for completely classifying
the local and non-local properties of all such global operators, given the
Hamiltonian and a bi-partitioning of the system. This framework is limited to
descriptions based on stabilizer quantum codes, but may be generalized. We
illustrate the use of this framework to study entanglement and non-local
correlations by analyzing global symmetries in topological order, distribution
of entanglement and entanglement entropy.Comment: 20 pages, 9 figure
SHARVOT: secret SHARe-based VOTing on the blockchain
Recently, there has been a growing interest in using online technologies to
design protocols for secure electronic voting. The main challenges include vote
privacy and anonymity, ballot irrevocability and transparency throughout the
vote counting process. The introduction of the blockchain as a basis for
cryptocurrency protocols, provides for the exploitation of the immutability and
transparency properties of these distributed ledgers.
In this paper, we discuss possible uses of the blockchain technology to
implement a secure and fair voting system. In particular, we introduce a secret
share-based voting system on the blockchain, the so-called SHARVOT protocol.
Our solution uses Shamir's Secret Sharing to enable on-chain, i.e. within the
transactions script, votes submission and winning candidate determination. The
protocol is also using a shuffling technique, Circle Shuffle, to de-link voters
from their submissions.Comment: WETSEB'18:IEEE/ACM 1st International Workshop on Emerging Trends in
Software Engineering for Blockchain. 5 pages, 2 figure
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
Cryptanalysis is an important branch in the study of cryptography, including
both the classical cryptography and the quantum one. In this paper we analyze
the security of two three-party quantum key distribution protocols (QKDPs)
proposed recently, and point out that they are susceptible to a simple and
effective attack, i.e. the dense-coding attack. It is shown that the
eavesdropper Eve can totally obtain the session key by sending entangled qubits
as the fake signal to Alice and performing collective measurements after
Alice's encoding. The attack process is just like a dense-coding communication
between Eve and Alice, where a special measurement basis is employed.
Furthermore, this attack does not introduce any errors to the transmitted
information and consequently will not be discovered by Alice and Bob. The
attack strategy is described in detail and a proof for its correctness is
given. At last, the root of this insecurity and a possible way to improve these
protocols are discussed.Comment: 6 pages, 3 figure
Monogamy of Correlations vs. Monogamy of Entanglement
A fruitful way of studying physical theories is via the question whether the
possible physical states and different kinds of correlations in each theory can
be shared to different parties. Over the past few years it has become clear
that both quantum entanglement and non-locality (i.e., correlations that
violate Bell-type inequalities) have limited shareability properties and can
sometimes even be monogamous. We give a self-contained review of these results
as well as present new results on the shareability of different kinds of
correlations, including local, quantum and no-signalling correlations. This
includes an alternative simpler proof of the Toner-Verstraete monogamy
inequality for quantum correlations, as well as a strengthening thereof.
Further, the relationship between sharing non-local quantum correlations and
sharing mixed entangled states is investigated, and already for the simplest
case of bi-partite correlations and qubits this is shown to be non-trivial.
Also, a recently proposed new interpretation of Bell's theorem by Schumacher in
terms of shareability of correlations is critically assessed. Finally, the
relevance of monogamy of non-local correlations for secure quantum key
distribution is pointed out, although, and importantly, it is stressed that not
all non-local correlations are monogamous.Comment: 12 pages, 2 figures. Invited submission to a special issue of Quantum
Information Processing. v2: Published version. Open acces
Search Me If You Can: Privacy-preserving Location Query Service
Location-Based Service (LBS) becomes increasingly popular with the dramatic
growth of smartphones and social network services (SNS), and its context-rich
functionalities attract considerable users. Many LBS providers use users'
location information to offer them convenience and useful functions. However,
the LBS could greatly breach personal privacy because location itself contains
much information. Hence, preserving location privacy while achieving utility
from it is still an challenging question now. This paper tackles this
non-trivial challenge by designing a suite of novel fine-grained
Privacy-preserving Location Query Protocol (PLQP). Our protocol allows
different levels of location query on encrypted location information for
different users, and it is efficient enough to be applied in mobile platforms.Comment: 9 pages, 1 figure, 2 tables, IEEE INFOCOM 201
- …