Anonymous Conference Key Agreement using GHZ states: Difference between revisions
(Created page with "<!-- This is a comment. You can erase them or write below --> <!-- Intro: brief description of the protocol --> This [https://arxiv.org/abs/2007.07995 example protocol] achie...") |
No edit summary |
||
Line 2: | Line 2: | ||
<!-- Intro: brief description of the protocol --> | <!-- Intro: brief description of the protocol --> | ||
This [https://arxiv.org/abs/2007.07995 example protocol] achieves the functionality of quantum conference key agreement | This [https://arxiv.org/abs/2007.07995 example protocol] achieves the functionality of quantum conference key agreement. This protocol allows multiple parties in a quantum network to establish a shared secret key anonymously. | ||
<!--Tags: related pages or category --> | <!--Tags: related pages or category --> | ||
Line 8: | Line 8: | ||
==Assumptions== | ==Assumptions== | ||
<!-- It describes the setting in which the protocol will be successful. --> | <!-- It describes the setting in which the protocol will be successful. --> | ||
We require the following for this protocol: | |||
# A source of n-party GHZ states | |||
# Private randomness sources | |||
# A randomness source that is not associated with any party | |||
# A classical broadcasting channel | |||
# Pairwise private communication channels | |||
==Outline== | ==Outline== | ||
Line 44: | Line 49: | ||
===Protocol 2: Notification=== | ===Protocol 2: Notification=== | ||
''Input: '' Sender's choice of <math>m</math> receivers | |||
''Goal: '' The <math>m</math> receivers get notified | |||
''Requirements: '' Private pairwise classical communication channels and randomness sources | |||
For agent <math>i = 1,...,n</math>: | |||
# All agents <math>j \in \{1,...,n\}</math> do the following: | |||
#* '''When agent <math>j</math> is the sender''': If <math>i</math> is not a receiver, the sender chooses <math>n</math> random bits <math>\{r_{j,k}^i\}_{k = 1}^n</math> such that <math>\bigoplus_{k=1}^n r_{j,k}^i = 0</math>. Otherwise, if <math>i</math> is a receiver, the sender chooses <math>n</math> random bits such that <math>\bigoplus_{k=1}^n r_{j,k}^i = 1</math>. The sender sends bit <math>r_{j,k}^i</math> to agent <math>k</math> | |||
#* '''When agent <math>j</math> is not the sender''': The agent chooses <math>n</math> random bits <math>\{r_{j,k}^i\}_{k = 1}^n</math> such that <math>\bigoplus_{k=1}^n r_{j,k}^i = 0</math> and sends bit <math>r_{j,k}^i</math> to agent <math>k</math> | |||
# All agents <math>k \in \{1,...,n\}</math> receive <math>\{r_{j,k}^i\}_{j = 1}^n</math>, and compute <math>z_k^i = \bigoplus_{j=1}^n r_{j,k}^i</math> and send it to agent <math>i</math> | |||
# Agent <math>i</math> takes the received <math>\{z_k^i\}_{k=1}^n</math> to compute <math>z^i = \bigoplus_{k=1}^nz_k^i</math>. If <math>z^i = 1</math>, they are thereby notified to be a designated receiver. | |||
===Protocol 3: Anonymous Multiparty Entanglement=== | ===Protocol 3: Anonymous Multiparty Entanglement=== | ||
''Input: '' <math>n</math>-partite GHZ state <math>\frac{1}{\sqrt{2}}(|0\rangle^{\otimes n} + |1\rangle^{\otimes n})</math> | |||
''Output: '' <math>(m+1)</math>-partite GHZ state <math>\frac{1}{\sqrt{2}}(|0\rangle^{\otimes (m+1)} + |1\rangle^{\otimes (m+1)})</math> shared between the sender and receivers | |||
''Requirements: '' A broadcast channel; private randomness sources | |||
# Sender and receivers draw a random bit each. Everyone else measures their qubits in the X-basis, yielding a measurement outcome bit <math>x_i</math> | |||
# All parties broadcast their bits in a random order, or if possible, simultaneously. | |||
# The sender applies a Z gate to their qubit if the parity of the non-participating parties' bits is odd. | |||
===Protocol 4: Verification=== | ===Protocol 4: Verification=== | ||
''Input: '' A verifier V; a shared state between <math>k</math> parties | |||
''Goal: '' Verification or rejection of the shared state as the GHZ<math>_k</math> state by V | |||
''Requirements: '' Private randomness sources; a classical broadcasting channel | |||
# Everyone but V draws a random bit <math>b_i</math> and measures in the X or Y basis if their bit equals 0 or 1 respectively, obtaining a measurement outcome <math>m_i</math>. V chooses both bits at random | |||
# Everyone (including V) broadcasts <math>(b_i,m_i)</math> | |||
# V resets her bit such that <math>\sum_ib_i = 0 (</math>mod <math>2)</math>. She measures in the X or Y basis if her bit equals 0 or 1 respectively, thereby also resetting her <math>m_i = m_v</math> | |||
# V accepts the state if and only if <math>\sum_im_i = \frac{1}{2}\sum_ib_i (</math>mod <math>2)</math> | |||
==Properties== | ==Properties== | ||
<!-- important information on the protocol: parameters (threshold values), security claim, success probability... --> | <!-- important information on the protocol: parameters (threshold values), security claim, success probability... --> |
Revision as of 20:59, 7 January 2022
This example protocol achieves the functionality of quantum conference key agreement. This protocol allows multiple parties in a quantum network to establish a shared secret key anonymously.
Assumptions
We require the following for this protocol:
- A source of n-party GHZ states
- Private randomness sources
- A randomness source that is not associated with any party
- A classical broadcasting channel
- Pairwise private communication channels
Outline
- First, the sender notifies each receiver in the network anonymously
- The entanglement source generates and distributes sufficient GHZ states to all nodes in the network
- The GHZ states are distilled to establish multipartite entanglement shared only by the participating parties (the sender and receivers)
- Each GHZ state is randomly chosen to be used for either Verification or Key Generation. For Key Generation rounds, a single bit of the key is established using one GHZ state by measuring in the Z-basis
- If the sender is content with the Verification results, they can anonymously validate the protocol and conclude that the key has been established successfully.
Notation
Protocol Description
Protocol 1: Anonymous Verifiable Conference Key Agreement
Input: Parameters and
Requirements: A source of n-party GHZ states; private randomness sources; a randomness source that is not associated with any party; a classical broadcasting channel; pairwise private communication channels
Goal: Anonymoous generation of key between sender and receivers
- The sender notifies the Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle m} receivers by running the Notification protocol
- The source generates and shares GHZ states
- The parties run the Anonymous Multipartite Entanglement protocol on the GHZ states
- For each Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle (m+1)}
-partite GHZ state, the parties do the following:
- They ask a source of randomness to broadcast a bit such that PrFailed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle [b=1] = \frac{1}{D}}
- Verification round: If b = 0, the sender runs Verification as verifier on the state corresponding to that round, while only considering the announcements of the receivers. The remaining parties announce random values.
- KeyGen round: If b = 1, the sender and receivers measure in the Z-basis.
- If the sender is content with the checks of the Verification protocol, they can anonymously validate the protocol
Protocol 2: Notification
Input: Sender's choice of receivers
Goal: The receivers get notified
Requirements: Private pairwise classical communication channels and randomness sources
For agent Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle i = 1,...,n} :
- All agents do the following:
- When agent is the sender: If is not a receiver, the sender chooses random bits such that . Otherwise, if is a receiver, the sender chooses random bits such that . The sender sends bit to agent
- When agent is not the sender: The agent chooses Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle n} random bits Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \{r_{j,k}^i\}_{k = 1}^n} such that and sends bit to agent
- All agents Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle k \in \{1,...,n\}} receive Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \{r_{j,k}^i\}_{j = 1}^n} , and compute and send it to agent
- Agent takes the received to compute . If , they are thereby notified to be a designated receiver.
Protocol 3: Anonymous Multiparty Entanglement
Input: -partite GHZ state
Output: -partite GHZ state shared between the sender and receivers
Requirements: A broadcast channel; private randomness sources
- Sender and receivers draw a random bit each. Everyone else measures their qubits in the X-basis, yielding a measurement outcome bit
- All parties broadcast their bits in a random order, or if possible, simultaneously.
- The sender applies a Z gate to their qubit if the parity of the non-participating parties' bits is odd.
Protocol 4: Verification
Input: A verifier V; a shared state between Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle k} parties
Goal: Verification or rejection of the shared state as the GHZ state by V
Requirements: Private randomness sources; a classical broadcasting channel
- Everyone but V draws a random bit and measures in the X or Y basis if their bit equals 0 or 1 respectively, obtaining a measurement outcome . V chooses both bits at random
- Everyone (including V) broadcasts
- V resets her bit such that Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \sum_ib_i = 0 (} mod . She measures in the X or Y basis if her bit equals 0 or 1 respectively, thereby also resetting her
- V accepts the state if and only if mod