Trap Code for Quantum Authentication

Revision as of 19:24, 8 December 2021 by 137.226.108.44 (talk) (Created page with "==Notation== *<math>\rho</math>: 1-qubit input state ==Protocol Description== *'''''Encoding:''''' #Input: <math>\rho</math>, pair of keys <math>k=(k_1, k_2)</math> #Apply a...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Notation

  • {\displaystyle \rho }: 1-qubit input state


Protocol Description

  • Encoding:
  1. Input: {\displaystyle \rho }, pair of keys {\displaystyle k=(k_{1},k_{2})}
  2. Apply an {\displaystyle [[n,1,d]]} error correction code (corrects up to {\displaystyle t} errors, {\displaystyle d=2t+1})
  3. Append an additional trap register of {\displaystyle n} qubits in state {\displaystyle |0\rangle \langle 0|^{\otimes n}}
  4. Append a second additional trap register of {\displaystyle n} qubits in state {\displaystyle |+\rangle \langle +|^{\otimes n}}
  5. Permute the total {\displaystyle 3n}-qubit register by {\displaystyle \pi _{k_{1}}} according to the key {\displaystyle k_{1}}
  6. Apply a Pauli encryption {\displaystyle P_{k_{2}}} according to key {\displaystyle k_{2}}
  • Decoding:
  1. Input: {\displaystyle \rho ^{\prime }} (state after encoding), pair of keys {\displaystyle k=(k_{1},k_{2})}
  2. Apply {\displaystyle P_{k_{2}}} according to key {\displaystyle k_{2}}
  3. Apply inverse permutation {\displaystyle \pi _{k_{1}}^{\dagger }} according to the key {\displaystyle k_{1}}
  4. Measure the last {\displaystyle n} qubits in the Hadamard basis
  5. Measure the second last {\displaystyle n} qubits in the computational basis
    a. If the two measurements result in {\displaystyle |+\rangle \langle +|} and {\displaystyle |0\rangle \langle 0|}, an additional flag qubit in state {\displaystyle |\mathrm {ACC} \rangle \langle \mathrm {ACC} |} is appended and the quantum message is decoded according to the error correction code
    b. Otherwise, an additional flag qubit in state   is appended and the (disturbed) encoded quantum message is replaced by a fixed state  


References

  1. Broadbent et al. (2012)
  2. Broadbent and Wainewright (2016).