Quantum Strong Coin Flipping: Difference between revisions
m (Natansh moved page Quantum Coin Flipping to Quantum Strong Coin Flipping) |
|||
(14 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
This [https://arxiv.org/abs/quant-ph/9904078 example protocol] allows two remote participants to share a uniformly distributed random bit. | |||
The parties do not trust each other and can only use classical and quantum channels to communicate. | The parties do not trust each other and can only use classical and quantum channels to communicate. | ||
The protocol allows them to perform what coin tossing for nearby parties performs without the involvement of any trusted third party. | The protocol allows them to perform what coin tossing for nearby parties performs without the involvement of any trusted third party. | ||
'''Tags:''' [[:Category:Two Party Protocols|Two Party Protocols]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]] | |||
[[Category:Two Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]] | |||
==Assumptions== | |||
==Outline== | ==Outline== | ||
Line 11: | Line 17: | ||
# Both the parties prepare an equal number of random bits. | # Both the parties prepare an equal number of random bits. | ||
# Now, both parties prepare another equal number of random bits for each random bit prepared in step 1. For each random bit thus prepared, each party sends the other party a pair of qubits in the two states defined earlier, the sequence of which is decided by the random bit. | # Now, both parties prepare another equal number of random bits for each random bit prepared in step 1. For each random bit thus prepared, each party sends the other party a pair of qubits in the two states defined earlier, the sequence of which is decided by the random bit. | ||
# Both the parties now announce the xor of each random bit prepared in the second step with the corresponding random bit from the first step. Based on the value of the xor operation performed by the other party, each party returns one of the two qubits it received in the second step. For every random bit prepared in the first step, each party is now left with qubits in the state | # Both the parties now announce the xor of each random bit prepared in the second step with the corresponding random bit from the first step. Based on the value of the xor operation performed by the other party, each party returns one of the two qubits it received in the second step. For every random bit prepared in the first step, each party is now left with qubits in the state labelled by the other party's random bit. | ||
# Both the parties now announce their random bits which they prepared in the first step. They also measure the qubits they did not return based on the values of the random bits announced by the other party. If any of the measurement fails, the protocol aborts. | # Both the parties now announce their random bits which they prepared in the first step. They also measure the qubits they did not return based on the values of the random bits announced by the other party. If any of the measurement fails, the protocol aborts. | ||
# For every random bit prepared in the first step, each party now also measures the qubits they were returned back. If any of the measurement fails, the protocol aborts. | # For every random bit prepared in the first step, each party now also measures the qubits they were returned back. If any of the measurement fails, the protocol aborts. | ||
Line 20: | Line 26: | ||
== | ==Notation== | ||
# <math>\psi(i) \ \forall \ i \in \{0,1\}</math>: Predetermined single qubit states | # <math>\psi(i) \ \forall \ i \in \{0,1\}</math>: Predetermined single qubit states | ||
Line 35: | Line 41: | ||
# <math>(E_i,E_i^\perp)</math>: POVMs defined by <math>E_i = |\Phi(i)\rangle\langle\Phi(i)|</math> and <math>E_i^\perp = 1 - E_i</math>. | # <math>(E_i,E_i^\perp)</math>: POVMs defined by <math>E_i = |\Phi(i)\rangle\langle\Phi(i)|</math> and <math>E_i^\perp = 1 - E_i</math>. | ||
==Requirements== | |||
== | *'''Network Stage:''' [[:Category:Fully Quantum Computing Network Stage|Fully Quantum Computing Network Stage]][[Category:Fully Quantum Computing Network Stage]] | ||
* Authenticated Quantum channel capable of sending a pair of qubits | * Authenticated Quantum channel capable of sending a pair of qubits | ||
* Authenticated Classical channel to send multiple bits | * Authenticated Classical channel to send multiple bits | ||
Line 44: | Line 49: | ||
* Random bit generator for each party | * Random bit generator for each party | ||
==Knowledge Graph== | |||
{{graph}} | |||
==Properties== | ==Properties== | ||
Line 49: | Line 57: | ||
* If any of the parties is dishonest at any step, the protocol simply aborts. | * If any of the parties is dishonest at any step, the protocol simply aborts. | ||
* The attack on the protocol can generate a bias which is greater than <math>O(1/{m^3})</math> and less than <math>1/m</math>. | * The attack on the protocol can generate a bias which is greater than <math>O(1/{m^3})</math> and less than <math>1/m</math>. | ||
* The proposed unconditionally secure quantum protocol realises a non-exact coin tossing. | |||
==Protocol Description== | |||
== | |||
Two single qubit quantum states <math>\psi(0) = c|0\rangle + s|1\rangle</math> and <math>\psi(1) = c|0\rangle - s|1\rangle</math>, where <math>c,s \in \mathbb{R}</math> are defined such that the angle between them is <math>\theta</math>. | Two single qubit quantum states <math>\psi(0) = c|0\rangle + s|1\rangle</math> and <math>\psi(1) = c|0\rangle - s|1\rangle</math>, where <math>c,s \in \mathbb{R}</math> are defined such that the angle between them is <math>\theta</math>. | ||
Line 83: | Line 91: | ||
The final bit of the first party is <math>A\oplus\tilde{B}</math> where <math>A=\oplus_ja_j</math> and <math>\tilde{B}=\oplus_j\tilde{b}_j</math>. | The final bit of the first party is <math>A\oplus\tilde{B}</math> where <math>A=\oplus_ja_j</math> and <math>\tilde{B}=\oplus_j\tilde{b}_j</math>. | ||
The second party’s final bit is <math>\tilde{A}\oplus B</math> where <math>\tilde{A}=\oplus_j\tilde{a}_j</math> and <math>B=\oplus_jb_j</math>. | The second party’s final bit is <math>\tilde{A}\oplus B</math> where <math>\tilde{A}=\oplus_j\tilde{a}_j</math> and <math>B=\oplus_jb_j</math>. | ||
==Further Information== | ==Further Information== | ||
<div style='text-align: right;'>''*contributed by Natansh Mathur''</div> | <div style='text-align: right;'>''*contributed by Natansh Mathur''</div> |
Latest revision as of 20:10, 7 June 2020
This example protocol allows two remote participants to share a uniformly distributed random bit. The parties do not trust each other and can only use classical and quantum channels to communicate. The protocol allows them to perform what coin tossing for nearby parties performs without the involvement of any trusted third party.
Tags: Two Party Protocols, Quantum Enhanced Classical Functionality, Specific Task
Assumptions[edit]
Outline[edit]
We consider two parties who wish to perform a coin tossing experiment remotely. Two single qubit quantum states are initially decided which have equal probability distribution in the computational basis and label them 0 and 1. The Coin Tossing protocol consists of 5 steps:
- Both the parties prepare an equal number of random bits.
- Now, both parties prepare another equal number of random bits for each random bit prepared in step 1. For each random bit thus prepared, each party sends the other party a pair of qubits in the two states defined earlier, the sequence of which is decided by the random bit.
- Both the parties now announce the xor of each random bit prepared in the second step with the corresponding random bit from the first step. Based on the value of the xor operation performed by the other party, each party returns one of the two qubits it received in the second step. For every random bit prepared in the first step, each party is now left with qubits in the state labelled by the other party's random bit.
- Both the parties now announce their random bits which they prepared in the first step. They also measure the qubits they did not return based on the values of the random bits announced by the other party. If any of the measurement fails, the protocol aborts.
- For every random bit prepared in the first step, each party now also measures the qubits they were returned back. If any of the measurement fails, the protocol aborts.
The final bit of each of the party is the xor of xor of the random bits they prepared in the first step and xor of the bits they measured in the fourth step. This final bit is the random bit which has come up in the 'coin toss'. Thus ends the protocol.
Notation[edit]
- : Predetermined single qubit states
- : Angle between and
- : A random bit prepared by the first party in step 1
- : A random bit prepared by the second party in step 1
- : Set of random bits prepared by first party in step 1
- : Set of random bits prepared by second party in step 1
- : A random bit prepared by the first party in step 2
- : A random bit prepared by the second party in step 2
- : Set of random bits prepared by first party in step 2
- : Set of random bits prepared by second party in step 2
- : Set of qubits, each in state
- : POVMs defined by and .
Requirements[edit]
- Network Stage: Fully Quantum Computing Network Stage
- Authenticated Quantum channel capable of sending a pair of qubits
- Authenticated Classical channel to send multiple bits
- Quantum memory for both parties to store qubits
- Measurement Devices for each party
- Random bit generator for each party
Knowledge Graph[edit]
Properties[edit]
- The protocol is successfully completed when both parties are honest.
- If any of the parties is dishonest at any step, the protocol simply aborts.
- The attack on the protocol can generate a bias which is greater than and less than .
- The proposed unconditionally secure quantum protocol realises a non-exact coin tossing.
Protocol Description[edit]
Two single qubit quantum states and , where are defined such that the angle between them is . is proposed to be . Thus, and .
- For :
- First party picks at random a bit .
- Second party picks at random a bit .
- For :
- For :
- The first party picks a random bit and sends a pair of qubits in the state to the second party.
- The second party picks a random bit and sends a pair of qubits in the state to the first party.
- For :
- For :
- For :
- The first party announces .
- The second party returns the second particle if and first particle otherwise.
- The second party announces .
- The first party returns the second particle if and first particle otherwise.
At this stage, for every , the qubits sent by the first party and not returned by the second party are in the state and the qubits sent by the second party and not returned by the first party are in the state .
Also, for every j, the n qubits returned by the first party are in the state and the n qubits returned by the second party are in the state .
- For :
- For :
- First party announces .
- Second party announces .
- Second party executes POVM on and notes the outcome .
- First party executes POVM on and notes the outcome .
If either or , the protocol aborts.
- For :
- First party measures the returned state with POVM .
- Second party measures the returned state with POVM .
If either of the outcomes is , the protocol aborts.
The final bit of the first party is where and . The second party’s final bit is where and .