A preview of this full-text is provided by Springer Nature.
Content available from Quantum Information Processing
This content is subject to copyright. Terms and conditions apply.
Quantum Information Processing (2019) 18:274
https://doi.org/10.1007/s11128-019-2387-2
Recovery from an eavesdropping attack on a qubit of a
graph state
Ankur Raina1·Shayan Srinivasa Garani1
Received: 18 May 2019 / Accepted: 18 July 2019 / Published online: 26 July 2019
© Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
Graph states are multipartite entangled pure states that can describe distributed quan-
tum information in a formal setting via the notion of nodes and edges. One qubit is
present at each node, and the entangling interactions are represented via the edges. We
investigate eavesdropping on one of the qubits of the graph state. The eavesdropper
uses an ancilla qubit to unitarily interact with one of the qubits followed by a mea-
surement on the ancilla qubit. We study the effect of eavesdropping on the graph state
and its connections to the graph topology. We propose the use of a modified graph
state by performing certain controlled unitary operations on the existing graph state.
This improves the error correcting ability of the graph state, and the modified graph
state can correct any error on one qubit.
Keywords Modified graph state ·Probe qubit ·Schmidt decomposition ·Quantum
error correction ·Target qubit
1 Introduction
One of the principal advantages of quantum communication using quantum states is the
ability to know whether the data are eavesdropped upon. Unlike classical data storage
where it is difficult to know the presence of an eavesdropper, quantum information
storage has advantages stemming from the basic principle that measurement destroys
superposition of quantum states. In this light, quantum key distribution (QKD) has
received importance for the generation of a classical key that can be used for ensuring
perfect secrecy [1]. BB84 [2] and Ekert [3] protocols are two well-known protocols
that gave birth to the secrecy of information in the quantum realm. Both protocols
BShayan Srinivasa Garani
shayangs@iisc.ac.in
Ankur Raina
ankur@iisc.ac.in
1Department of Electronic Systems Engineering, Indian institute of Science, Bengaluru, India
123
Content courtesy of Springer Nature, terms of use apply. Rights reserved.