Polynomial Code based Quantum Authentication: Difference between revisions

From Quantum Protocol Zoo
Jump to navigation Jump to search
No edit summary
Line 6: Line 6:
*The sender and the receiver share a private (known to only the two of them), classical random key drawn from a probability distribution.
*The sender and the receiver share a private (known to only the two of them), classical random key drawn from a probability distribution.
==Outline==
==Outline==
# Preprocessing: A and B agree on some stabilizer purity testing code (<math>Q_k</math>) and some private and random
binary strings <math>k</math>, <math>x</math>, and <math>y</math>.
# A q-encrypts ρ as τ using key x. A encodes τ according to Qk for the code Qk with syndrome y to produce
σ. A sends the result to B.
#B receives the n qubits. Denote the received state by σ B measures the syndrome y′ of the code Qk on his qubits. B compares y to y′, and aborts if any error is detected. B decodes his n-qubit word according to
Qk, obtaining τ′. B q-decrypts τ′ using x and obtains ρ′.
'''Purity Testing Code:'''
==Notations==
==Notations==
*<math>s</math>: security parameter
*<math>s</math>: security parameter

Revision as of 16:02, 24 June 2019

The example protocol provides a non-interactive scheme for the sender to encrypt as well as authenticate quantum messages. It was the first protocol designed to achieve the task of authentication for quantum states, i.e. it gives the guarantee that the message sent by a party (suppliant) over a communication line is received by a party on the other end (authenticator) as it is and, has not been tampered with or modified by the dishonest party (eavesdropper).

Tags: Two Party Protocol, Quantum Functionality, Specific Task, Building Block

Assumptions

  • The sender and the receiver share a private (known to only the two of them), classical random key drawn from a probability distribution.

Outline

  1. Preprocessing: A and B agree on some stabilizer purity testing code () and some private and random

binary strings , , and .

  1. A q-encrypts ρ as τ using key x. A encodes τ according to Qk for the code Qk with syndrome y to produce

σ. A sends the result to B.

  1. B receives the n qubits. Denote the received state by σ B measures the syndrome y′ of the code Qk on his qubits. B compares y to y′, and aborts if any error is detected. B decodes his n-qubit word according to

Qk, obtaining τ′. B q-decrypts τ′ using x and obtains ρ′.

Purity Testing Code:

Notations

  • : security parameter
  • : number of qubits in the message.

Properties

  • For an qubit message, the protocol requires qubits encoded state, and a private key of .

Pseudo Code

Further Information

References

contributed by Shraddha Singh