An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players
Abstract
:1. Introduction
Organization
2. Preliminaries
3. The Protocol for Simultaneous Reciprocal Information Exchange between 2 Players
3.1. The Quantum Part of the Protocol
3.2. The Classical Part of the Protocol
- Alice must use two classical public channels to communicate with Bob and Charlie. Specifically, she must send through these channels the information bit vectors and to Bob and Charlie, respectively.
- Bob and Charlie must use a third classical channel to communicate with each other. This communication must take place with caution. They must not reveal the entire contents of their input registers because then Alice, and any other adversary for that matter, will be able to piece together the secret information in and . They must transmit only the absolutely necessary information for the successful completion of the exchange. This means that Bob must send to Charlie only the information vector and not the whole contents of his input register. Reciprocally, Charlie must send to Bob only the information vector and not the whole contents of his input register.
4. Security and Efficiency Considerations
4.1. Security
- (Attack1)
- Measure and Resend. In this type of attack, Eve’s strategy is to intercept the triplets during their transmission from Alice to Bob and Charlie, measure them, and then resend them back to Bob and Charlie. By doing so, Eve will fail to discover any information because, at this phase, the triplets do not carry any information. Consequently, the ESR protocol is completely impervious to this strategy.
- (Attack2)
- Intercept and Resend. In such an attack, Eve’s strategy is to intercept triplets during their transmission from Alice to Bob and Charlie. Then, since cloning is prohibited by the no-cloning theorem, in her effort to get information, Eve measures them on a predefined basis. Afterwards, Eve prepares new qubits and sends them to the intended recipient. As we have pointed out above, during the transmission phase of the ESR protocol, the triplets carry no information whatsoever. Thus, Eve fails again to discover any information.
- (Attack3)
- Entangle and Measure. In this type of attack, Eve’s strategy is to intercept the triplets during their transmission from Alice to Bob and Charlie. However, now Eve does not measure them, but entangles them with her ancilla state and then sends the corresponding GHZ qubits to Bob and Charlie. Furthermore, Eve waits until the protocol is complete before measuring her qubits, hoping to gain useful information. However, the result of Eve’s actions is that instead of having n triplets evenly distributed among Alice, Bob, and Charlie, we end up with n quadruples evenly distributed among Alice, Bob, Charlie, and Eve. Accordingly, during the classical part of the ESR protocol, when Alice, Bob, and Charlie send their (partial) measurements through the public channel, hoping to unlock the secret information, they will realize that they are not able to reveal the secret information vectors and because they will require Eve’s measurement. Eve will also fail to compute and because, in order to achieve this, she needs the bit vectors and that Bob and Charlie possess, respectively, but never transmit through the public channel. Therefore, in this case, Eve will also fail, whereas Bob and Charlie will be able to infer that Eve tempered with the protocol.
- (Attack4)
- PNS. The photon number splitting attack (PNS), first introduced in [53] and later analyzed in [54,55], is currently regarded as one of the most effective attack strategies that Eve can employ against any quantum protocol. As it happens with our current technology, photon sources occasionally do not emit single-photon signals, which practically means that a photon source may produce multiple identical photons instead of just one. This opens up for Eve the possibility of intercepting pulses emanating from Alice for the distribution of the triplets, keeping one photon from the multi-photon pulse for herself, and sending the remaining photons to Bob and Charlie without being detected during the transmission phase. Nonetheless, as the execution of the ESR protocol shows, the situation in this case resembles the Entangle and Measure attack analyzed above. Again, instead of triplets evenly distributed among Alice, Bob, and Charlie, there are quadruples evenly distributed among Alice, Bob, Charlie, and Eve. Eve becomes effectively the fourth player and is unable to gain any information about the other players’ measurements.
4.2. Efficiency
5. Discussion and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chen, L.; Chen, L.; Jordan, S.; Liu, Y.K.; Moody, D.; Peralta, R.; Perlner, R.; Smith-Tone, D. Report on Post-Quantum Cryptography; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016; Volume 12. [Google Scholar]
- Alagic, G.; Alagic, G.; Alperin-Sheriff, J.; Apon, D.; Cooper, D.; Dang, Q.; Liu, Y.K.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar]
- Alagic, G.; Alperin-Sheriff, J.; Apon, D.; Cooper, D.; Dang, Q.; Kelsey, J.; Liu, Y.K.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process; US Department of Commerce, NIST: Gaithersburg, MD, USA, 2020. [Google Scholar]
- Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022. [Google Scholar]
- Shor, P. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994. [Google Scholar] [CrossRef]
- Grover, L. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996. [Google Scholar] [CrossRef] [Green Version]
- Chow, J.; Dial, O.; Gambetta, J. IBM Quantum Breaks the 100-Qubit Processor Barrier. 2021. Available online: https://research.ibm.com/blog/127-qubit-quantum-processor-eagle (accessed on 3 April 2022).
- Newsroom, I. IBM Unveils 400 Qubit-Plus Quantum Processor. 2022. Available online: https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two (accessed on 3 April 2022).
- Chamola, V.; Jolfaei, A.; Chanana, V.; Parashari, P.; Hassija, V. Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 2021, 176, 99–118. [Google Scholar] [CrossRef]
- Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 1992, 68, 557–559. [Google Scholar] [CrossRef] [PubMed]
- Gisin, N.; Ribordy, G.; Zbinden, H.; Stucki, D.; Brunner, N.; Scarani, V. Towards practical and fast quantum cryptography. arXiv 2004, arXiv:quant-ph/0411022. [Google Scholar]
- Inoue, K.; Waks, E.; Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 2002, 89, 037902. [Google Scholar] [CrossRef]
- Guan, J.Y.; Cao, Z.; Liu, Y.; Shen-Tu, G.L.; Pelc, J.S.; Fejer, M.; Peng, C.Z.; Ma, X.; Zhang, Q.; Pan, J.W. Experimental passive round-robin differential phase-shift quantum key distribution. Phys. Rev. Lett. 2015, 114, 180502. [Google Scholar] [CrossRef] [Green Version]
- Waks, E.; Takesue, H.; Yamamoto, Y. Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 2006, 73, 012344. [Google Scholar] [CrossRef] [Green Version]
- Ampatzis, M.; Andronikos, T. QKD Based on Symmetric Entangled Bernstein-Vazirani. Entropy 2021, 23, 870. [Google Scholar] [CrossRef]
- Ampatzis, M.; Andronikos, T. A Symmetric Extensible Protocol for Quantum Secret Sharing. Symmetry 2022, 14, 1692. [Google Scholar] [CrossRef]
- Attasena, V.; Darmont, J.; Harbi, N. Secret sharing for cloud data security: A survey. VLDB J. 2017, 26, 657–681. [Google Scholar] [CrossRef] [Green Version]
- Ermakova, T.; Fabian, B. Secret sharing for health data in multi-provider clouds. In Proceedings of the 2013 IEEE 15th Conference on Business Informatics, Vienna, Austria, 15–18 July 2013; pp. 93–100. [Google Scholar]
- Cha, J.; Singh, S.K.; Kim, T.W.; Park, J.H. Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 2021, 57, 102686. [Google Scholar] [CrossRef]
- Karlsson, A.; Koashi, M.; Imoto, N. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 1999, 59, 162. [Google Scholar] [CrossRef]
- Smith, A.D. Quantum secret sharing for general access structures. arXiv 2000, arXiv:quant-ph/0001087. [Google Scholar]
- Gottesman, D. Theory of quantum secret sharing. Phys. Rev. A 2000, 61, 042311. [Google Scholar] [CrossRef] [Green Version]
- Fortescue, B.; Gour, G. Reducing the quantum communication cost of quantum secret sharing. IEEE Trans. Inf. Theory 2012, 58, 6659–6666. [Google Scholar] [CrossRef] [Green Version]
- Qin, H.; Tang, W.K.; Tso, R. Hierarchical quantum secret sharing based on special high-dimensional entangled state. IEEE J. Sel. Top. Quantum Electron. 2020, 26, 1–6. [Google Scholar] [CrossRef]
- Senthoor, K.; Sarvepalli, P.K. Theory of communication efficient quantum secret sharing. IEEE Trans. Inf. Theory 2022, 68, 3164–3186. [Google Scholar] [CrossRef]
- Fu, Y.; Yin, H.L.; Chen, T.Y.; Chen, Z.B. Long-distance measurement-device-independent multiparty quantum communication. Phys. Rev. Lett. 2015, 114, 090501. [Google Scholar] [CrossRef] [Green Version]
- Wu, X.; Wang, Y.; Huang, D. Passive continuous-variable quantum secret sharing using a thermal source. Phys. Rev. A 2020, 101, 022301. [Google Scholar] [CrossRef]
- Grice, W.P.; Qi, B. Quantum secret sharing using weak coherent states. Phys. Rev. A 2019, 100, 022339. [Google Scholar] [CrossRef] [Green Version]
- Gu, J.; Xie, Y.M.; Liu, W.B.; Fu, Y.; Yin, H.L.; Chen, Z.B. Secure quantum secret sharing without signal disturbance monitoring. Opt. Express 2021, 29, 32244–32255. [Google Scholar] [CrossRef]
- An, L.; Yang, G.H. Enhancement of opacity for distributed state estimation in cyber–physical systems. Automatica 2021, 136, 110087. [Google Scholar] [CrossRef]
- Broadbent, A.; Fitzsimons, J.; Kashefi, E. Universal Blind Quantum Computation. In Proceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer Science, Atlanta, GA, USA, 25–27 October 2009. [Google Scholar] [CrossRef] [Green Version]
- Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
- Meyer, D.A. Quantum strategies. Phys. Rev. Lett. 1999, 82, 1052. [Google Scholar] [CrossRef] [Green Version]
- Eisert, J.; Wilkens, M.; Lewenstein, M. Quantum games and quantum strategies. Phys. Rev. Lett. 1999, 83, 3077. [Google Scholar] [CrossRef] [Green Version]
- Andronikos, T.; Sirokofskich, A.; Kastampolidou, K.; Varvouzou, M.; Giannakis, K.; Singh, A. Finite Automata Capturing Winning Sequences for All Possible Variants of the PQ Penny Flip Game. Mathematics 2018, 6, 20. [Google Scholar] [CrossRef] [Green Version]
- Andronikos, T.; Sirokofskich, A. The Connection between the PQ Penny Flip Game and the Dihedral Groups. Mathematics 2021, 9, 1115. [Google Scholar] [CrossRef]
- Andronikos, T. Conditions that enable a player to surely win in sequential quantum games. Quantum Inf. Process. 2022, 21, 268. [Google Scholar] [CrossRef]
- Giannakis, K.; Theocharopoulou, G.; Papalitsas, C.; Fanarioti, S.; Andronikos, T. Quantum Conditional Strategies and Automata for Prisoners’ Dilemmata under the EWL Scheme. Appl. Sci. 2019, 9, 2635. [Google Scholar] [CrossRef] [Green Version]
- Giannakis, K.; Papalitsas, C.; Kastampolidou, K.; Singh, A.; Andronikos, T. Dominant Strategies of Quantum Games on Quantum Periodic Automata. Computation 2015, 3, 586–599. [Google Scholar] [CrossRef] [Green Version]
- Andronikos, T.; Stefanidakis, M. A Two-Party Quantum Parliament. Algorithms 2022, 15, 62. [Google Scholar] [CrossRef]
- Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
- Cruz, D.; Fournier, R.; Gremion, F.; Jeannerot, A.; Komagata, K.; Tosic, T.; Thiesbrummel, J.; Chan, C.L.; Macris, N.; Dupertuis, M.A.; et al. Efficient Quantum Algorithms for GHZ and W States, and Implementation on the IBM Quantum Computer. Adv. Quantum Technol. 2019, 2, 1900015. [Google Scholar] [CrossRef] [Green Version]
- IBM. IBM Quantum Composer. Available online: https://quantum-computing.ibm.com/composer (accessed on 3 April 2022).
- Ampatzis, M.; Andronikos, T. Quantum Secret Aggregation Utilizing a Network of Agents. Cryptography 2023, 7, 5. [Google Scholar] [CrossRef]
- Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
- Mermin, N. Quantum Computer Science: An Introduction; Cambridge University Press: Cambridge, UK, 2007. [Google Scholar] [CrossRef]
- Qiskit. Qiskit Open-Source Quantum Development. Available online: https://qiskit.org (accessed on 3 April 2022).
- Wolf, R. Quantum Key Distribution; Springer International Publishing: Berlin/Heidelberg, Germany, 2021. [Google Scholar] [CrossRef]
- Renner, R.; Wolf, R. Quantum Advantage in Cryptography. AIAA J. 2023, 61, 1895–1910. [Google Scholar] [CrossRef]
- Coffman, V.; Kundu, J.; Wootters, W.K. Distributed entanglement. Phys. Rev. A 2000, 61, 052306. [Google Scholar] [CrossRef] [Green Version]
- Brunner, N.; Cavalcanti, D.; Pironio, S.; Scarani, V.; Wehner, S. Bell nonlocality. Rev. Mod. Phys. 2014, 86, 419. [Google Scholar] [CrossRef] [Green Version]
- Huttner, B.; Imoto, N.; Gisin, N.; Mor, T. Quantum cryptography with coherent states. Phys. Rev. A 1995, 51, 1863. [Google Scholar] [CrossRef] [Green Version]
- Lütkenhaus, N. Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 2000, 61, 052304. [Google Scholar] [CrossRef] [Green Version]
- Brassard, G.; Lütkenhaus, N.; Mor, T.; Sanders, B.C. Limitations on practical quantum cryptography. Phys. Rev. Lett. 2000, 85, 1330. [Google Scholar] [CrossRef] [Green Version]
- Tsai, C.W.; Hsieh, C.R.; Hwang, T. Dense coding using cluster states and its application on deterministic secure quantum communication. Eur. Phys. J. D 2011, 61, 779–783. [Google Scholar] [CrossRef]
- Hwang, T.; Hwang, C.C.; Tsai, C.W. Quantum key distribution protocol using dense coding of three-qubit W state. Eur. Phys. J. D 2011, 61, 785–790. [Google Scholar] [CrossRef]
- Cabello, A. Quantum Key Distribution in the Holevo Limit. Phys. Rev. Lett. 2000, 85, 5635–5638. [Google Scholar] [CrossRef] [Green Version]
- Banerjee, A.; Pathak, A. Maximally efficient protocols for direct secure quantum communication. Phys. Lett. A 2012, 376, 2944–2950. [Google Scholar] [CrossRef]
- Joy, D.; Surendran, S.P.; Sabir, M. Efficient deterministic secure quantum communication protocols using multipartite entangled states. Quantum Inf. Process. 2017, 16, 157. [Google Scholar] [CrossRef]
Notations and Abbreviations | |
---|---|
Symbolism | Operation |
ACQ | Alice creates n triplets of qubits in the state |
AB | Alice sends to Bob one qubit from each triplet through the quantum channel |
AC | Alice sends to Charlie one qubit from each triplet via the quantum channel |
BQC | Bob applies his quantum circuit and measures his input register |
AQC | Alice applies her quantum circuit and measures her input register |
CQC | Charlie applies his quantum circuit and measures his input register |
Bob sends to Charlie the bit vector | |
Alice sends to Bob the bit vector | |
Alice sends to Charlie the bit vector | |
Charlie sends to Bob the bit vector |
Notations and Abbreviations | |
---|---|
Symbolism | Explanation |
n | The number of qubits in each input register |
AIR | Alice’s n-qubit Input Register |
BIR | Bob’s n-qubit Input Register |
BOR | Bob’s single qubit Output Register |
CIR | Charlie’s n-qubit Input Register |
COR | Charlie’s single qubit Output Register |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Andronikos, T.; Sirokofskich, A. An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players. Electronics 2023, 12, 2506. https://doi.org/10.3390/electronics12112506
Andronikos T, Sirokofskich A. An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players. Electronics. 2023; 12(11):2506. https://doi.org/10.3390/electronics12112506
Chicago/Turabian StyleAndronikos, Theodore, and Alla Sirokofskich. 2023. "An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players" Electronics 12, no. 11: 2506. https://doi.org/10.3390/electronics12112506
APA StyleAndronikos, T., & Sirokofskich, A. (2023). An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players. Electronics, 12(11), 2506. https://doi.org/10.3390/electronics12112506