3 years ago

Entanglement verification protocols for distributed systems based on the Quantum Recursive Network Architecture.

Stefano Carretta, Michele Amoretti

In distributed systems based on the Quantum Recursive Network Architecture, quantum channels and quantum memories are used to establish entangled quantum states between node pairs. Such systems are robust against attackers that interact with the quantum channels. Conversely, weaknesses emerge when an attacker takes full control of a node and alters the configuration of the local quantum memory, either to make a denial-of-service attack or to reprogram the node. In such a scenario, entanglement verification over quantum memories is a means for detecting the intruder. Usually, entanglement verification approaches focus either on untrusted sources of entangled qubits (photons, in most cases) or on eavesdroppers that interfere with the quantum channel while entangled qubits are transmitted. Instead, in this work we assume that the source of entanglement is trusted, but parties may be dishonest. Looking for efficient entanglement verification protocols that only require classical channels and local quantum operations to work, we thoroughly analyze the one proposed by Nagy and Akl, that we denote as NA2010 for simplicity, and we define and analyze two entanglement verification protocols based on teleportation (denoted as AC1 and AC2), characterized by increasing efficiency in terms of intrusion detection probability versus sacrificed quantum resources.

Publisher URL: http://arxiv.org/abs/1707.02895

DOI: arXiv:1707.02895v2

You might also like
Discover & Discuss Important Research

Keeping up-to-date with research can feel impossible, with papers being published faster than you'll ever be able to read them. That's where Researcher comes in: we're simplifying discovery and making important discussions happen. With over 19,000 sources, including peer-reviewed journals, preprints, blogs, universities, podcasts and Live events across 10 research areas, you'll never miss what's important to you. It's like social media, but better. Oh, and we should mention - it's free.

  • Download from Google Play
  • Download from App Store
  • Download from AppInChina

Researcher displays publicly available abstracts and doesn’t host any full article content. If the content is open access, we will direct clicks from the abstracts to the publisher website and display the PDF copy on our platform. Clicks to view the full text will be directed to the publisher website, where only users with subscriptions or access through their institution are able to view the full article.