Loss-tolerant quantum secure positioning with weak laser sources

被引:3
|
作者
Lim, Charles Ci Wen [1 ]
Xu, Feihu [2 ]
Siopsis, George [3 ]
Chitambar, Eric [4 ]
Evans, Philip G. [1 ]
Qi, Bing [1 ,3 ]
机构
[1] Oak Ridge Natl Lab, Computat Sci & Engn Div, Quantum Informat Sci Grp, Oak Ridge, TN 37831 USA
[2] MIT, Res Lab Elect, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[3] Univ Tennessee, Dept Phys & Astron, Knoxville, TN 37996 USA
[4] Southern Illinois Univ, Dept Phys & Astron, Carbondale, IL 62901 USA
关键词
KEY DISTRIBUTION; TELEPORTATION; CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.94.032315
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Loss-tolerant Confidential Efficient Authenticated Broadcast Scheme
    Nasiraee, Hassan
    Mohasefi, Jamshid B.
    2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2014, : 239 - 244
  • [42] Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theory
    Curras-Lorenzo, Guillermo
    Navarrete, Alvaro
    Pereira, Margarida
    Tamaki, Kiyoshi
    PHYSICAL REVIEW A, 2021, 104 (01)
  • [43] Loss-tolerant tests of Einstein-Podolsky-Rosen steering
    Evans, D. A.
    Cavalcanti, E. G.
    Wiseman, H. M.
    PHYSICAL REVIEW A, 2013, 88 (02):
  • [44] Optimal Resource Allocation for Loss-Tolerant Multicast Video Streaming
    ul Zuhra, Sadaf
    Besser, Karl-Ludwig
    Chaporkar, Prasanna
    Karandikar, Abhay
    Poor, H. Vincent
    ENTROPY, 2023, 25 (07)
  • [45] Loss-tolerant state engineering for quantum-enhanced metrology via the reverse Hong–Ou–Mandel effect
    Alexander E. Ulanov
    Ilya A. Fedorov
    Demid Sychev
    Philippe Grangier
    A. I. Lvovsky
    Nature Communications, 7
  • [46] Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (06) : 615 - 625
  • [47] A Loss-tolerant Scheme for Unicast Routing in VANETs using Network Coding
    Wu, Celimuge
    Ohzahata, Satoshi
    Kato, Toshihiko
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1058 - 1063
  • [48] Loss-tolerant QoS using firm constraints in guaranteed rate networks
    Koubaa, A
    Song, YQ
    RTAS 2004: 10TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2004, : 526 - 533
  • [49] Error- and loss-tolerant bundle fragment authentication for space DTNs
    Xixiang Lv
    Hui Li
    Frontiers of Computer Science, 2014, 8 : 1012 - 1023
  • [50] Error- and loss-tolerant bundle fragment authentication for space DTNs
    Lv, Xixiang
    Li, Hui
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (06) : 1012 - 1023