Editing Verifiable Quantum Anonymous Transmission
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
This [https:// | This [https://arxiv.org/abs/1811.04729 example protocol] implements the task of [[Anonymous Transmission]] in a multi-node quantum network. The protocol uses an untrusted <math>n</math>-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called <math>\epsilon</math>-anonymity. | ||
==Assumptions== | ==Assumptions== | ||
Line 13: | Line 13: | ||
* <span style="font-variant:small-caps">Notification</span> [[Verifiable Quantum Anonymous Transmission#References|[3]]]: allows one player to anonymously notify another player, using <span style="font-variant:small-caps">LogicalOR</span>. | * <span style="font-variant:small-caps">Notification</span> [[Verifiable Quantum Anonymous Transmission#References|[3]]]: allows one player to anonymously notify another player, using <span style="font-variant:small-caps">LogicalOR</span>. | ||
* <span style="font-variant:small-caps">RandomBit</span> [[Verifiable Quantum Anonymous Transmission#References|[1]]]: allows one player to anonymously choose a bit according to a probability distribution, using <span style="font-variant:small-caps">LogicalOR</span>. | * <span style="font-variant:small-caps">RandomBit</span> [[Verifiable Quantum Anonymous Transmission#References|[1]]]: allows one player to anonymously choose a bit according to a probability distribution, using <span style="font-variant:small-caps">LogicalOR</span>. | ||
* <span style="font-variant:small-caps"> | * <span style="font-variant:small-caps">Verification</span> [[Verifiable Quantum Anonymous Transmission#References|[4,5]]]: allows one player (the Verifier) to run a test to check if the shared state is the GHZ state. The Verifier instructs each player to measure their qubit in a particular basis and checks the parity of the measurement outcomes. | ||
* <span style="font-variant:small-caps">Anonymous Entanglement</span> [[Verifiable Quantum Anonymous Transmission#References|[2]]]: <math>n-2</math> nodes (all except for <math>\mathcal{S}</math> and <math>\mathcal{R}</math>) measure in the <math>X</math> basis and broadcast their measurement outcome. <math>\mathcal{S}</math> and <math>\mathcal{R}</math> broadcast random dummy bits. The parity of measurement outcomes allows the establishment of an entangled link between <math>\mathcal{S}</math> and <math>\mathcal{R}</math> which is called anonymous entanglement. | * <span style="font-variant:small-caps">Anonymous Entanglement</span> [[Verifiable Quantum Anonymous Transmission#References|[2]]]: <math>n-2</math> nodes (all except for <math>\mathcal{S}</math> and <math>\mathcal{R}</math>) measure in the <math>X</math> basis and broadcast their measurement outcome. <math>\mathcal{S}</math> and <math>\mathcal{R}</math> broadcast random dummy bits. The parity of measurement outcomes allows the establishment of an entangled link between <math>\mathcal{S}</math> and <math>\mathcal{R}</math> which is called anonymous entanglement. | ||
Line 37: | Line 37: | ||
* <math>q</math>: the security parameter. | * <math>q</math>: the security parameter. | ||
== | ==Requirements== | ||
[[File:Verifiable Quantum Anonymous Transmission.png|center|Verifiable Quantum Anonymous Transmission]] | |||
==Properties== | ==Properties== | ||
Line 60: | Line 60: | ||
where <math>\mathcal{A}</math> is the subset of <math>t</math> adversaries among <math>n</math> nodes and <math>C</math> is the register that contains all classical and quantum side information accessible to the adversaries. | where <math>\mathcal{A}</math> is the subset of <math>t</math> adversaries among <math>n</math> nodes and <math>C</math> is the register that contains all classical and quantum side information accessible to the adversaries. | ||
== | ==Pseudocode== | ||
====<span style="font-variant:small-caps"><math>\epsilon</math>-anonymous transmission of a quantum message</span>==== | ====<span style="font-variant:small-caps"><math>\epsilon</math>-anonymous transmission of a quantum message</span>==== | ||
Line 168: | Line 168: | ||
==References== | ==References== | ||
# [https:// | # [https://arxiv.org/abs/1811.04729 Unnikrishnan et al (2018)] | ||
# [https://link.springer.com/chapter/10.1007/11593447_12 Christandl and Wehner (2005)] | # [https://link.springer.com/chapter/10.1007/11593447_12 Christandl and Wehner (2005)] | ||
# [https://arxiv.org/abs/0706.2010 Broadbent and Tapp (2007)] | # [https://arxiv.org/abs/0706.2010 Broadbent and Tapp (2007)] |