1 / 16

Joan Vaccaro Joe Spring Anthony Chefles

Quantum Polling. Joan Vaccaro Joe Spring Anthony Chefles. Griffith University. PRA 75, 012333 (2007), quant-ph/050 4 161. ~ Hillery et al. PLA 349 75 (2006), quant-ph/050 5 041. Uni of Hertfordshire. HP Labs, Bristol. QUantum PRoperties Of DIstributed Systems. scalable.

holleb
Télécharger la présentation

Joan Vaccaro Joe Spring Anthony Chefles

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum Polling Joan Vaccaro Joe Spring Anthony Chefles Griffith University PRA 75, 012333 (2007), quant-ph/0504161 ~ Hillery et al. PLA 349 75 (2006), quant-ph/0505041 Uni of Hertfordshire HP Labs, Bristol QUantumPRoperties OfDIstributed Systems

  2. scalable Introduction ~ small scale quantum processing quantum data security QKD – commercial… other (incl. multiparty) protocolsQuantum Fingerprinting Quantum Seals Authentication of Quantum Messages Quantum Broadcast CommunicationQuantum Anonymous TransmissionsQuantum Exam Secret Sharing

  3. Introduction ~ Small scale quantum processing Quantum data security QKD – 2 party protocols – commercial… Other (incl. multiparty) protocolsQuantum Broadcast CommunicationQuantum Fingerprinting Quantum Seals Authentication of Quantum MessagesQuantum Anonymous TransmissionsQuantum Exam Secret Sharing Quantum Fingerprinting [Buhrman…PRL 87, 167902 (2003)] fingerprint: smaller string ~ uniquely identifies message. quantum fingerprints of classical messages are exp. smallerQuantum Seals [Bechmann-Pasquinucci quant-ph/0303173] encode classical message in quantum state (0 |0>|0>|f>, 1|1>|1>|f>, order of bits is random, |f>=|0>+ei|1>) easily read (majority vote) – can detect if message has been readAuthentication of Quantum Messages [Barnum… quant-ph/0205128] allows Bob to check that message has not been altered e.g. distribute EPR pairs, use purity checking, teleport,… Quantum Anonymous Transmissions [Christandl… quant-ph/0409201] share GHZ state, pi phase, Hadamard, measure – announce, answer is mod 2. Can also share entanglement with “anon Bob”Quantum Exam [Nguyen PLA 350, 174 (2006)] share GHZ states – local meas. gives shared random class. key – use key to send common exam text and the individual answers.Secret Sharing [Hillery…, PRA 59 1829 ;Cleve…PRL 83 648 (1999)]

  4. k = 2, n = 2 y (x2, y2) (x1, y1) c 0 x Shamir, ACM 22, 612 (1979) e.g. distribute key to 2 people Secret sharing (n,k) threshold scheme-n shares- need k pieces to reveal secret Classical (2,2) threshold scheme: - two secret numbers m, c - encode as linear equation y = m x + c slope = m Quantum (2,2) threshold scheme Cleve, Gottesman & Lo, PRL 83, 648 (1999) quantum secret

  5. k = 2, n = 2 y (x2, y2) (x1, y1) c 0 x Shamir, ACM 22, 612 (1979) partial traces  e.g. distribute key to 2 people Secret sharing (n,k) threshold scheme-n shares- need k pieces to reveal secret Classical (2,2) threshold scheme: - two secret numbers m, c - encode as linear equation y = m x + c slope = m Quantum (2,2) threshold scheme Cleve, Gottesman & Lo, PRL 83, 648 (1999) quantum secret

  6. N “particles” V T tallyman voting “booth” Secure survey Estimate (or gift) Q1 of each person is: - private to each person - nonbinding (receipt not nec.)Net amount is known publicly Distributed ballot state

  7. N “particles” V T tallyman voting “booth” Secure survey Estimate (or gift) Q1 of each person is: - private to each person - nonbinding (receipt not nec.)Net amount is known publicly Distributed ballot state 1st person applies local phase shift  for estimate Q1 at voting booth for  = Q1

  8. voting “booth” T V tallyman Effect on ballot state: Partial traces: Secrecy: phase value  is not available locally

  9. V T tallyman voting “booth” and thus net amountM Global measurementyields ….after the k th person: where is net amount Global phase-state basis Pegg & Barnett PRA 39, 1665 (1989)

  10. Local attack– colluding to learn amounts offered: Rewrite ballot state as: Imagine: A measures the phase angle locally and finds value of  is random Subsequent amounts tendered accumulatelocally: C then measures the phase angle Collusion by A and C reveals net amount M . Detection: Tallyman detects attack by measuring total particle number (with prob. ~ 11/N )

  11. Global Measurement in the basis yields and thus net amount M Defence - multiparty ballot state: K booths: one for each person T V tallyman voting booths

  12. Secure voting Vote of each person is: - private, receipt-free - limited to 1 voteTally of votes is known publicly Use multiparty ballot state: “No” = zero phase shift “Yes” = phase shift of  Vote: Problem: not restricted to 1 vote/personSolution: use • restricted voting system • extra (trusted) electoral agent

  13. Restricted voting system Voter prepares qutrit pairs (basis ) Extra (trusted) electoral agent one qutrit is given to Tallyman, other qutrit is given to a local Electoral Agent Vote is recorded in ballot state using the local operation tallyman electoral agent ballot qutrits

  14. Attack– colluding by Tallyman and Electoral Agent to measure state of qutrit pairs Defence– increase number of Electoral Agents Example:triplet of qutrits Tallyman 2 Agents 2 Agents Tallyman Reducesrisk of collusion (all parties need to be involved) Reducesinformation available to each Agent

  15. computational complexity:distribute 1-time pads = N(N-1) 2 101101011001001101 101101011001001101 T Comparison  Classical scheme D. Chaum EuroCrypt '88, 177 (1998) Chaum’s secret ballot protocol unconditionally secure - uses blind signature and sender untraceability - share one-time pads between all pairs of voters  Quantum schemecomputational complexity: distribute & collect ballot state to N voters = 2N order N speedup adv. is scalability!

  16. Summary advocate small scale processing secure survey • multiparty ballot state • each offer is anonymous secure voting • 1 vote per voter • extra Electoral Agents • receipt-free

More Related