-
Quantum Kolmogorov complexity and quantum correlations in deterministic-control quantum Turing machines
Authors:
Mariano Lemus,
Ricardo Faleiro,
Paulo Mateus,
Nikola Paunković,
André Souto
Abstract:
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it…
▽ More
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it to study three particular aspects of the algorithmic information contained in a quantum state: a comparison of the information in a quantum state with that of its classical representation as an array of real numbers, an exploration of the limits of quantum state copying in the context of algorithmic complexity, and study of the complexity of correlations in quantum systems, resulting in a correlation-aware definition for algorithmic mutual information that satisfies symmetry of information property.
△ Less
Submitted 15 January, 2024; v1 submitted 23 May, 2023;
originally announced May 2023.
-
A Private Quantum Bit String Commitment
Authors:
Mariana Gama,
Paulo Mateus,
André Souto
Abstract:
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticat…
▽ More
We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticated channel. The protocol remains secure (but not private) if we realize the random oracles as physical unclonable functions in the so-called bad PUF model with access before the opening phase.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
Authors:
Mariano Lemus,
Mariana F. Ramos,
Preeti Yadav,
Nuno A. Silva,
Nelson J. Muga,
Andre Souto,
Nikola Paunkovic,
Paulo Mateus,
Armando N. Pinto
Abstract:
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments us…
▽ More
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach, quantum and classical, we obtain a practical and high-speed oblivious transfer protocol, secure even against quantum computer attacks. The oblivious distributed keys allow implementing a fast and secure oblivious transfer protocol, which can pave the way for the widespread of applications based on secure multiparty computation.
△ Less
Submitted 17 June, 2020; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Experimental Semi-quantum Key Distribution With Classical Users
Authors:
Francesco Massa,
Preeti Yadav,
Amir Moqanaki,
Walter O. Krawec,
Paulo Mateus,
Nikola Paunković,
André Souto,
Philip Walther
Abstract:
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanic…
▽ More
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks
△ Less
Submitted 18 September, 2022; v1 submitted 5 August, 2019;
originally announced August 2019.
-
Quantum contract signing with entangled pairs
Authors:
P. Yadav,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can o…
▽ More
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can obtain a signed copy of the contract, while Alice cannot, can be made arbitrarily small, and scales as $N^{-1/2}$, where $4N$ is the total number of rounds (communications between the two clients) of the protocol. Thus, the protocol is {\em optimistic}, as the cheating is not successful, and the clients rarely have to contact Trent to confirm their honesty by delivering the actual signed certificates of the contract. Unlike the previous protocol [Paunković, et al., 2017], in the present proposal, a single client can obtain the signed contract alone, without the need for the other client's presence. When first contacting Trent, the clients do not have to agree upon a definitive contract. Moreover, even upon terminating the protocol, the clients do not reveal the actual contract to Trent. Finally, the protocol is based on the laws of physics, rather than on mathematical conjectures and the exchange of a large number of signed authenticated messages during the actual contract signing process. Therefore, it is {\em abuse-free}, as Alice and Bob cannot prove they are involved in the contract signing process.
△ Less
Submitted 3 September, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Quantum key distribution with quantum walks
Authors:
Chrysoula Vlachou,
Walter Krawec,
Paulo Mateus,
Nikola Paunkovic,
Andre Souto
Abstract:
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle att…
▽ More
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle attacks. Furthermore, we present a one-way protocol and prove its security. Finally, we propose a semi-quantum variation and prove its robustness against eavesdrop**.
△ Less
Submitted 3 October, 2018; v1 submitted 22 October, 2017;
originally announced October 2017.
-
Quantum machines with classical control
Authors:
Paulo Mateus,
Daowen Qiu,
Andre Souto
Abstract:
Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with…
▽ More
Herein we survey the main results concerning quantum automata and machines with classical control. These machines were originally proposed by Sernadas et al in [37], during the FCT QuantLog project. First, we focus on the expressivity of quantum automata with both quantum and classical states. We revise the result obtained in [32] where it was proved that such automata are able to recognise, with exponentially less states than deterministic finite automata, a family of regular languages that cannot be recognised by other types of quantum automata. Finally, we revise the concept of quantum Turing machine with classical control introduced in [25]. The novelty of these machines consists in the fact that their termination problem is completely deterministic, in opposition to other notions in the literature. Concretely, we revisit the result that such machines fulfil the s-m-n property, while kee** the expressivity of a quantum model for computation.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Quantum walks public key cryptographic system
Authors:
C. Vlachou,
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol t…
▽ More
Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public-key generation and encryption/decryption procedures.
△ Less
Submitted 3 February, 2016;
originally announced February 2016.
-
Oblivious transfer based on single-qubit rotations
Authors:
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing o…
▽ More
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing only "few-qubit" coherent measurements. We also present a single-bit oblivious transfer based on the proposed bit-string protocol. The protocol can be implemented with current technology based on optics.
△ Less
Submitted 4 September, 2017; v1 submitted 30 July, 2014;
originally announced July 2014.
-
Oblivious transfer based on quantum state computational distinguishability
Authors:
A. Souto,
P. Mateus,
P. Adão,
N. Paunković
Abstract:
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that fa…
▽ More
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that factoring is unfeasible. To overcome this, quantum mechanics has been used intensively in the past decades, and alternatives resistant to quantum attacks have been developed in order to fulfill the (potential) lack of security of a significant number of classical schemes.
In this paper, we present a quantum computationally secure protocol for oblivious transfer between two parties, under the assumption of quantum hardness of state distinguishability. The protocol is feasible, in the sense that it is implementable in polynomial time.
△ Less
Submitted 24 March, 2014;
originally announced March 2014.