6,319 Hits in 5.8 sec

Quantum Information Processing with Adversarial Devices [article]

Matthew McKague
2010 arXiv   pre-print
We consider several applications in black-box quantum computation in which untrusted physical quantum devices are connected together to produce an experiment.  ...  This is useful in order to verify that a calculation has been performed correctly, that measurement outcomes are secure, or that the devices are producing the desired state.  ...  The devices are considered to be adversarial, always operating in such a way as to maximize the information leakage to Eve.  ... 
arXiv:1006.2352v1 fatcat:d4itjymsnjg2jfbjdmif32dpxa

An Authentication Protocol for Quantum Enabled Mobile Devices

Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
2018 Zenodo  
The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange.  ...  We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.  ...  But the attacker cannot gain any information in the process by hampers the quantum key distribution between the user device and server. D.  ... 
doi:10.5281/zenodo.2022712 fatcat:rg7raezvqrebxdzrladpuzeuam

Cyber security in the quantum era

Petros Wallden, Elham Kashefi
2019 Communications of the ACM  
To achieve such tasks one needs quantum computation devices that are compatible with the quantum communication devices.  ...  Security against an adversary with an oracle quantum computer.  ... 
doi:10.1145/3241037 fatcat:iwatci4qfjdzzmflcvkgssc52m

Device-independent Randomness Amplification and Privatization

Max Kessler, Rotem Arnon-Friedman
2020 IEEE Journal on Selected Areas in Information Theory  
Index Terms-Randomness, quantum cryptography, quantum information theory, device-independence, entropies.  ...  Quantum physics, on the other hand, allows for such a process, even in the most paranoid cryptographic sense termed "device-independent quantum cryptography".  ...  Both the device and the source can be correlated with some classical side information λ that the adversary holds.  ... 
doi:10.1109/jsait.2020.3012498 fatcat:7wbhnlcsnvfzzodjrhronvuxbm

Device-independent Randomness Amplification and Privatization [article]

Max Kessler, Rotem Arnon-Friedman
2017 arXiv   pre-print
of a quantum adversary.  ...  Quantum physics, on the other hand, allows for such a process, even in the most paranoid cryptographic sense termed "quantum device-independent cryptography".  ...  Acknowledgments We thank Gilles Pütz for helpful discussions about the MDL inequalities and for letting us use his code to evaluate numerically the optimal violation of the inequalities within quantum  ... 
arXiv:1705.04148v2 fatcat:7bbjrkkhpffx3logt2redxepqm

Random numbers certified by Bell's theorem

S. Pironio, A. Acín, S. Massar, A. Boyer de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, C. Monroe
2010 Nature  
Here, inspired by earlier work on nonlocality based and device independent quantum information processing, we show that the nonlocal correlations of entangled quantum particles can be used to certify the  ...  Our results lay the groundwork for future device-independent quantum information experiments and for addressing fundamental issues raised by the intrinsic randomness of quantum theory.  ...  random, even when conditioned on the information of a potential quantum adversary.  ... 
doi:10.1038/nature09008 pmid:20393558 fatcat:evtdfjpguvfdjco6rgzbupnzm4

Security of practical private randomness generation

Stefano Pironio, Serge Massar
2013 Physical Review A. Atomic, Molecular, and Optical Physics  
to show that the generated string is random with respect to an adversary that holds only classical-side information, i.e., proving randomness against quantum-side information is not necessary.  ...  Since this process requires a small initial random seed, one usually speaks of device-independent randomness expansion. The purpose of this paper is twofold.  ...  This quantum information can be intercepted by the adversary and entangled with his own quantum system.  ... 
doi:10.1103/physreva.87.012336 fatcat:yqftuwszlbbxjg2ofdzkxnlipy

Vulnerability of quantum classification to adversarial perturbations [article]

Nana Liu, Peter Wittek
2019 arXiv   pre-print
These include quantum machine learning algorithms, witnesses in quantum information processing and certain decision problems.  ...  Since dimensionality grows exponentially with the number of qubits, the potential power of noisy intermediate-scale quantum (NISQ) devices over classical resources also stems from entangled states in high  ...  Acknowledgements We thank Micha l Oszmaniec (University of Gdańsk), Roger Melko (Perimeter Institute for Theoretical Physics and Institute for Quantum Computing, University of Waterloo), Gael Sentís (University  ... 
arXiv:1905.04286v1 fatcat:csw3bagskjhcnpsywstsxngsxy

Security of Trusted Repeater Quantum Key Distribution Networks [article]

Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alleaume, Norbert Lutkenhaus, Thomas Laenger
2009 arXiv   pre-print
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security.  ...  We conclude that secret keys can be generated through disjoint paths in a private and authentic way against ( − 1)-bounded adversaries and against ( − 2)bounded adversaries with honest-but-curious paths  ...  We suppose that Alice and Bob do not share key material to start with. They only share keys with their direct neighbours.  ... 
arXiv:0904.4072v1 fatcat:2z44ykvkazf7nd664tttkph7mu

Controlled Quantum Teleportation in the Presence of an Adversary [article]

Sayan Gangopadhyay, Tiejun Wang, Atefeh Mashatan, Shohini Ghose
2022 arXiv   pre-print
These results are relevant for building practical quantum communication networks and also shed light on the role of nonlocality in multipartite quantum information processing.  ...  We present a device independent analysis of controlled quantum teleportation where the receiver is not trusted.  ...  NXM's autonomous security technology enables devices, including connected vehicles, to communicate securely with each other and their surroundings without human intervention while leveraging data at the  ... 
arXiv:2208.05554v1 fatcat:nrk3r3h57bewvd7z3p2ynffvwm

Building one-time memories from isolated qubits

Yi-Kai Liu
2014 Proceedings of the 5th conference on Innovations in theoretical computer science - ITCS '14  
empirical process.  ...  In this model, we construct OTM's that are information-theoretically secure against one-pass LOCC adversaries that use 2-outcome measurements.  ...  Moreover, an adversary can always obtain partial information about both s and t.  ... 
doi:10.1145/2554797.2554823 dblp:conf/innovations/Liu14 fatcat:pmto6ehj4vcxrpuwgb426h2t7q

Location-dependent communications using quantum entanglement

Robert A. Malaney
2010 Physical Review A. Atomic, Molecular, and Optical Physics  
In this work we show how unconditional location verification can be achieved with the use of quantum communication channels.  ...  Quantum location verification represents a new application of quantum entanglement that delivers a feat not possible in the classical-only channel.  ...  This being the case, an adversary with no device at the location being verified cannot pass the verification test.  ... 
doi:10.1103/physreva.81.042319 fatcat:ptk3hveynzd43ez6x4mrnz62pq

Practical randomness amplification and privatisation with implementations on quantum computers [article]

Cameron Foreman, Sherilyn Wright, Alec Edgington, Mario Berta, Florian J. Curchod
2022 arXiv   pre-print
an adversary.  ...  Our generation rates are linear in the repetition rate of the quantum device and the classical randomness post-processing has quasi-linear complexity - making it efficient on a standard personal laptop  ...  We acknowledge discussions with Mafalda Almeida, Fernando Brandão, Silas Dilkes, Christopher Portmann, Volkher B. Scholz, Kimberley Worrall and Richie Yeung.  ... 
arXiv:2009.06551v2 fatcat:n5by2itzevhfln6rcnqxvyuyfm

Weak randomness seriously limits the security of quantum key distribution

Jan Bouda, Matej Pivoluska, Martin Plesch, Colin Wilmott
2012 Physical Review A. Atomic, Molecular, and Optical Physics  
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).  ...  Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection.  ...  Recent investigations have shown that quantum-information processing can help to increase security of communication using weak randomness even for regions of parameters where purely classical processing  ... 
doi:10.1103/physreva.86.062308 fatcat:l2o56usmnndyxgnmkzpslxekta

Re-QGAN: an optimized adversarial quantum circuit learning framework [article]

Sandra Nguemto, Vicente Leyton-Ortega
2022 arXiv   pre-print
Constraining the number of quantum operations and providing a design with a low compilation cost, we propose a quantum generative adversarial network design that uses real Hilbert spaces as the framework  ...  for the generative model and a novel strategy to encode classical information into the quantum framework.  ...  Quantum Machine Learning [1, 2] has been concerned with applying concepts and tools from quantum computation and quantum information to enhance the treatment and processing of classical machine learning  ... 
arXiv:2208.02165v2 fatcat:gm2hfoyrtrhwzdpfsceri73yra
« Previous Showing results 1 — 15 out of 6,319 results