Clifford Code for Quantum Authentication

Revision as of 12:41, 22 December 2021 by 91.35.144.136 (talk)

The Clifford Authentication Scheme was introduced in the paper Interactive Proofs For Quantum Computations by Aharanov et al.. It applies a random Clifford operator to the quantum message and an auxiliary register and then measures the auxiliary register to decide whether to accept or abort for quantum authentication.

Tags: Two Party Protocol

Outline

The Clifford code encodes a quantum message by appending an auxiliary register with each qubit in state   and then applying a random Clifford operator on all qubits. The authenticator then measures only the auxiliary register. If all qubits in the auxiliary register are still in state  , the authenticator accepts and decodes the quantum message. Otherwise, the authenticator aborts the process.

Notations

  •  : suppliant (sender)
  •  : authenticator (prover)
  •  :  -qubit state to be transmitted
  •  : security parameter defining the number of qubits in the auxiliary register
  •  : set of Clifford operations on   qubits labelled by a classical key  

Properties

  • The Clifford code makes use of   qubits
  • The Clifford code is quantum authentication scheme with security  
  • The qubit registers used can be divided into a message register with   qubits, an auxiliary register with   qubits, and a flag register with   qubit.

Protocol Description

  • Input:  ,  ,  
  • Output: Receiver accepts or rejects
    • Encoding:  
  1.   appends an auxiliary register of   qubits in state   to the quantum message  , which results in  .
  2.   then applies   for a uniformly random   on the total state.
  3.   sends the result to  .
    • Decoding: Mathematically, the decoding process is described by
       
      In the above,   is the trace over the auxiliary register only, and   is the trace over the quantum message system and the auxiliary system. Furthermore,   and   are projective measurement operators.
  1.   applies the inverse Clifford   to the received state, which is denoted by  .
  2.   measures the auxiliary register in the computational basis.
    a. If all   auxiliary qubits are 0, the state is accepted and an additional flag qubit in state   is appended.
    b. Otherwise, the remaining system is traced out and replaced with a fixed  -qubit state   and an additional flag qubit in state   is appended.


References

  1. Aharanov et al. (2008).
  2. Broadbent and Wainewright (2016).
contributed by Shraddha Singh and Isabel Nha Minh Le