2015
DOI: 10.1103/physreva.92.052304
|View full text |Cite
|
Sign up to set email alerts
|

Practical position-based quantum cryptography

Abstract: We study a general family of quantum protocols for position verification and present a new class of attacks based on the Clifford hierarchy. These attacks outperform current strategies based on portbased teleportation for a large class of practical protocols. We then introduce the Interleaved Product protocol, a new scheme for position verification involving only the preparation and measurement of single-qubit states for which the best available attacks have a complexity exponential in the number of classical … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 31 publications
0
20
0
Order By: Relevance
“…These include, for instance, quantum bit commitment, [162][163][164] quantum secret sharing, [165][166][167] quantum coin flipping, 168,169 quantum fingerprinting, 170,171 quantum digital signatures, 172,173 blind quantum computing 174,175 and position-based quantum cryptography. [176][177][178] It is known that some of those protocols, such as quantum bit commitment and position-based quantum cryptography, cannot be perfectly achieved with unconditional security. However, other security models exist, such as, for instance, those based on relativistic constraints or on noisy storage assumptions, 179 where by assuming that it is impossible for an eavesdropper to store quantum information for a long time, one can retrieve security for such protocols.…”
Section: Resultsmentioning
confidence: 99%
“…These include, for instance, quantum bit commitment, [162][163][164] quantum secret sharing, [165][166][167] quantum coin flipping, 168,169 quantum fingerprinting, 170,171 quantum digital signatures, 172,173 blind quantum computing 174,175 and position-based quantum cryptography. [176][177][178] It is known that some of those protocols, such as quantum bit commitment and position-based quantum cryptography, cannot be perfectly achieved with unconditional security. However, other security models exist, such as, for instance, those based on relativistic constraints or on noisy storage assumptions, 179 where by assuming that it is impossible for an eavesdropper to store quantum information for a long time, one can retrieve security for such protocols.…”
Section: Resultsmentioning
confidence: 99%
“…Subsequent work has also been conducted on the instantaneous nonlocal computation of certain families of gates. For gates belonging to the so-called Clifford hierarchy, specialized protocols have been devised by Chakraborty and Leverrier [20]. General LOBC protocols were referred to as fast protocols by Yu et al in Ref.…”
Section: Instantaneous Nonlocal Quantum Computationmentioning
confidence: 99%
“…Our aim is to extend this procedure to a generic null surface which, of course, will not be a Killing horizon. We shall consider a general null surface and describe it in terms of some suitable null coordinates, called the Gaussian null coordinates (see e.g., [35,36]), defined locally in the vicinity of the surface, and use the spacetime geometry near that surface. Such surfaces, as we shall see below, are much more general than the Killing horizons.…”
Section: The Formalismmentioning
confidence: 99%
“…The most general geometry in the local neighborhood of a null surface can be described using the Gaussian Null Coordinates (see e.g., Ref. [35,36] and references therein), in which the metric takes the form:…”
Section: The Geometrymentioning
confidence: 99%