Loss-tolerant quantum secure positioning with weak laser sources

被引:3
|
作者
Lim, Charles Ci Wen [1 ]
Xu, Feihu [2 ]
Siopsis, George [3 ]
Chitambar, Eric [4 ]
Evans, Philip G. [1 ]
Qi, Bing [1 ,3 ]
机构
[1] Oak Ridge Natl Lab, Computat Sci & Engn Div, Quantum Informat Sci Grp, Oak Ridge, TN 37831 USA
[2] MIT, Res Lab Elect, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[3] Univ Tennessee, Dept Phys & Astron, Knoxville, TN 37996 USA
[4] Southern Illinois Univ, Dept Phys & Astron, Carbondale, IL 62901 USA
关键词
KEY DISTRIBUTION; TELEPORTATION; CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.94.032315
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks
    Xie, Mande
    Bhanja, Urmila
    Wei, Guiyi
    Ling, Yun
    Hassan, Mohammad Mehedi
    Alamri, Atif
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (10): : 2668 - 2680
  • [22] Loss-tolerant quantum multi-party key agreement without quantum storage
    Wei, Chun-Yan
    Cai, Xiao-Qiu
    Huang, Shao-Long
    Lang, Xiao-Lin
    Wang, Tian-Yin
    OPTICS EXPRESS, 2022, 30 (22): : 42569 - 42583
  • [23] Loss-tolerant authentication with digital signatures
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2054 - 2062
  • [24] Loss-tolerant operations in parity-code linear optics quantum computing
    Hayes, A. J. F.
    Gilchrist, A.
    Ralph, T. C.
    PHYSICAL REVIEW A, 2008, 77 (01)
  • [25] Loss-tolerant measurement-device-independent quantum random number generation
    Cao, Zhu
    Zhou, Hongyi
    Ma, Xiongfeng
    NEW JOURNAL OF PHYSICS, 2015, 17
  • [26] Loss-tolerant quantum dense metrology with SU(1,1) interferometer
    Liu, Yuhong
    Li, Jiamin
    Cui, Liang
    Huo, Nan
    Assad, Syed M.
    Li, Xiaoying
    Ou, Z. Y.
    OPTICS EXPRESS, 2018, 26 (21): : 27705 - 27715
  • [27] Measurement-device-independent and arbitrarily loss-tolerant verification of quantum steering
    Jeon, Inu
    Jeong, Hyunseok
    PHYSICAL REVIEW A, 2019, 99 (01)
  • [28] Loss-tolerant all-photonic quantum repeater with generalized Shor code
    Zhang, Rui
    Liu, Li-Zheng
    Li, Zheng-Da
    Fei, Yue-Yang
    Yin, Xu-Fei
    Li, Li
    Liu, Nai-Le
    Mao, Yingqiu
    Chen, Yu-Ao
    Pan, Jian-Wei
    OPTICA, 2022, 9 (02): : 152 - 158
  • [29] Deterministic Generation of Loss-Tolerant Photonic Cluster States with a Single Quantum Emitter
    Zhan, Yuan
    Sun, Shuo
    PHYSICAL REVIEW LETTERS, 2020, 125 (22)
  • [30] Loss-tolerant teleportation on large stabilizer states
    Morley-Short, Sam
    Gimeno-Segovia, Mercedes
    Rudolph, Terry
    Cable, Hugo
    QUANTUM SCIENCE AND TECHNOLOGY, 2019, 4 (02)