ArticlePublisher preview available

Recovery from an eavesdropping attack on a qubit of a graph state

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Graph states are multipartite entangled pure states that can describe distributed quantum information in a formal setting via the notion of nodes and edges. One qubit is present at each node, and the entangling interactions are represented via the edges. We investigate eavesdropping on one of the qubits of the graph state. The eavesdropper uses an ancilla qubit to unitarily interact with one of the qubits followed by a measurement on the ancilla qubit. We study the effect of eavesdropping on the graph state and its connections to the graph topology. We propose the use of a modified graph state by performing certain controlled unitary operations on the existing graph state. This improves the error correcting ability of the graph state, and the modified graph state can correct any error on one qubit.
An example of 5 nodes used for describing a graph state. The source is at node 1. CZ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm {CZ}$$\end{document} operations capture all the entangling interactions between qubits connected by undirected edges. Qubits at nodes 2, 3, 4 and 5 are initially prepared in |+⟩\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\vert +\rangle $$\end{document} state. CZ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm {CZ}$$\end{document} gate is applied between every pair of qubits located at nodes connected by edges. The unitary interaction that entangles all the qubits is CZ12CZ14CZ15CZ23CZ24CZ34CZ35CZ45\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathrm {CZ}_{12}\mathrm {CZ}_{14}\mathrm {CZ}_{15}\mathrm {CZ}_{23}\mathrm {CZ}_{24}\mathrm {CZ}_{34}\mathrm {CZ}_{35}\mathrm {CZ}_{45}$$\end{document}. The graph encodes the state |ϕ⟩\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\vert \phi \rangle $$\end{document} into |ψ⟩\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\vert \psi \rangle $$\end{document}
… 
Block diagram depicting the encoding via U\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {U}}$$\end{document}, eavesdropping operation via U and decoding after measurement in the {|+⟩,|-⟩}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{\vert +\rangle ,\vert -\rangle \}$$\end{document} basis. Random variables X, Y, Z exist at the source, the destination and the eavesdropper. The quantum state encoded via U\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {U}}$$\end{document} in the graph state undergoes unitary interaction U with the probe qubit of the eavesdropper. This is followed by measurement of the probe qubit by the eavesdropper. The graph state becomes mixed and undergoes the usual inversion via U†\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {U}}^{\dagger }$$\end{document}. The corresponding quantum states at various stages are also shown
… 
The circuit detects four types of error, namely I,X,Z\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathbf {I,X,Z}$$\end{document} and XZ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathbf {XZ}$$\end{document}. Sx\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {S}}_x$$\end{document} detects X\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathbf {X}}$$\end{document} error, and Sz\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {S}}_z$$\end{document} detects Z\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathbf {Z}}$$\end{document} error. Measurement on the ancilla qubits aids the detection of the type of error. The state at various stages is denoted by |ψ1′⟩\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\vert \psi _1'\rangle $$\end{document}, |ψ2′⟩,|ψ3′⟩\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\vert \psi _2'\rangle ,\vert \psi _3'\rangle $$\end{document}
… 
This content is subject to copyright. Terms and conditions apply.
Quantum Information Processing (2019) 18:274
https://doi.org/10.1007/s11128-019-2387-2
Recovery from an eavesdropping attack on a qubit of a
graph state
Ankur Raina1·Shayan Srinivasa Garani1
Received: 18 May 2019 / Accepted: 18 July 2019 / Published online: 26 July 2019
© Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
Graph states are multipartite entangled pure states that can describe distributed quan-
tum information in a formal setting via the notion of nodes and edges. One qubit is
present at each node, and the entangling interactions are represented via the edges. We
investigate eavesdropping on one of the qubits of the graph state. The eavesdropper
uses an ancilla qubit to unitarily interact with one of the qubits followed by a mea-
surement on the ancilla qubit. We study the effect of eavesdropping on the graph state
and its connections to the graph topology. We propose the use of a modified graph
state by performing certain controlled unitary operations on the existing graph state.
This improves the error correcting ability of the graph state, and the modified graph
state can correct any error on one qubit.
Keywords Modified graph state ·Probe qubit ·Schmidt decomposition ·Quantum
error correction ·Target qubit
1 Introduction
One of the principal advantages of quantum communication using quantum states is the
ability to know whether the data are eavesdropped upon. Unlike classical data storage
where it is difficult to know the presence of an eavesdropper, quantum information
storage has advantages stemming from the basic principle that measurement destroys
superposition of quantum states. In this light, quantum key distribution (QKD) has
received importance for the generation of a classical key that can be used for ensuring
perfect secrecy [1]. BB84 [2] and Ekert [3] protocols are two well-known protocols
that gave birth to the secrecy of information in the quantum realm. Both protocols
BShayan Srinivasa Garani
shayangs@iisc.ac.in
Ankur Raina
ankur@iisc.ac.in
1Department of Electronic Systems Engineering, Indian institute of Science, Bengaluru, India
123
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... In Eq. (31), CZ i j refers to the CZ gate between nodes i and j. The expressions are similar to what we used in [23] except the assumption of |φ k ∈ {|+ , |− }. In this paper, we allow for a general |φ k to accommodate mixed states. ...
... In this paper, we allow for a general |φ k to accommodate mixed states. Much of what follows in this section is taken from [23] expressing the Schmidt decomposition for the sake of completeness and readability. We reiterate the Schmidt decomposition for the above state with the two cases labeled by a = 1 and a = 1. ...
... The idea is to represent the encoding of basis state with respect to the ath node. Consider the encoded state labeled by a as [23] |ψ k (a) = ...
Article
Full-text available
Measurement-based quantum computation (MBQC) is an alternative way of quantum information processing that describes the unitary evolution of a quantum state using the cluster state and well-defined sequential measurements. We give a closed form expression for the unitary evolution that a state goes through in terms of the network parameters and measurement outcomes on various qubits of the network. We extend the framework of MBQC to describe quantum channels. Using the new framework, we define a valid quantum unital channel between any two nodes of a graph consisting of nodes connected by edges. We describe the channel in terms of the network parameters and initial state. Our generalization consists of modifying the unitary operation, measurement operators, initial arbitrary state of the qubits at all the nodes of the network. We also study the inverse problem of devising an appropriate approximate unitary in the generalized MBQC to create any given quantum channel.
... Moreover, Meignant et al. [56] investigated a novel protocol for distributing the GHZ states and the graph states in arbitrary quantum networks. Later, Raina et al. [57] investigated the effects of eavesdropping attacks on the amount of information distributed in graph states. Gyongyosi et al. [58] presented an efficient routing protocol to find the shortest paths in quantum networks. ...
... For the ideal case, the graph states are generated by preparing all vertices' qubits as the initial states (|0 + |1 ) √ 2 [56][57][58][59][60][61][62]64]. In this paper, we consider one more universal scenario where some vertices' qubits are initially prepared as arbitrary superposition states. ...
Article
Full-text available
In recent years, the development of graph states has opened a bright prospect for the generation of multipartite entangled states. However, due to the influences of noises in the surroundings, the obtained graph states may not be maximally entangled, which have been rarely explored previously. In this paper, we first consider how to generate one particular graph state which is named as the non-maximally entangled graph state. Next, we analyze the properties of the non-maximally entangled graph states and introduce two different kinds of graph states according to the entanglement of the non-maximally entangled graph states. Finally, we demonstrate how to teleport arbitrary unknown single-qubit state by using the non-maximally graph states. Compared with previous teleportation protocol, it demonstrates higher efficiency and lower operational complexity. We expect that our works can provide a theoretical instruction for the future study of the graph states.
Article
Distributed quantum information stored over nodes within a quantum network are prone to node failures, motivating the need for coded quantum networks. We encode k qubits of quantum information over an n-node network in a distributed fashion, with one qubit per node, using modified graph-state codes. We devise a procedure to recover the encoded quantum information in any given arbitrary network after a detected node fails. The recovery procedure is locally within four edges of the failed node. For a network with even number of nodes, we provide a class of scalable modified graph-state codes with rate (n−2)/n, saturating the quantum Singleton bound. This yields higher coding rates than Grassl et al.'s well-known erasure codes and has asymptotic rate 1. For odd node size n, we design the network links to obtain an (n−3)/n rate-optimal modified graph state code.
Article
Full-text available
Scalable quantum computing and communication requires the protection of quantum information from the detrimental effects of decoherence and noise. Previous work tackling this problem has relied on the original circuit model for quantum computing. However, recently a family of entangled resources known as graph states has emerged as a versatile alternative for protecting quantum information. Depending on the graph's structure, errors can be detected and corrected in an efficient way using measurement-based techniques. Here we report an experimental demonstration of error correction using a graph state code. We use an all-optical setup to encode quantum information into photons representing a four-qubit graph state. We are able to reliably detect errors and correct against qubit loss. The graph we realize is setup independent, thus it could be employed in other physical settings. Our results show that graph state codes are a promising approach for achieving scalable quantum information processing.
Article
The construction of quantum error correcting codes was described. The basic ingredients of the code were a graph and a finite Abelian group. The necessary and sufficient conditions for the graph were proved such that the resulting code corrected a certain number of errors. This allowed the one-error correcting property of codes of length 5 to be verified.
Book
I would like to thank here a number of people to whom I am indebted in one way or another. To begin, there are five people from whose insights I especially benefited in my formative years in physics. In order of appearance: Sze M. Tan, for teaching me classical measurement theory, and introducing me to information theory and thermodynamics; Howard M. Wiseman, for teaching me about quantum measurement theory; Salman Habib, for teachingme about open systems and classical chaos; Tanmoy Bhattacharya, for enlightenment on a great variety of topics, and especially for the insight that measurement is driven by diffusion gradients; Gerard Jungman, for mathematical and physical insights, and for introducing me to many beautiful curiosities.
Article
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
Article
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition. We review the notion of security necessary for a protocol to be usable in a larger cryptographic context, i.e., for it to remain secure when composed with other secure protocols. We then derive the corresponding security criterion for QKD. We provide several examples of QKD composed in sequence and parallel with different cryptographic schemes to illustrate how the error of a composed protocol is the sum of the errors of the individual protocols. We also discuss the operational interpretations of the distance metric used to quantify these errors.
Article
One of the most cited books in physics of all time, Quantum Computation and Quantum Information remains the best textbook in this exciting field of science. This 10th anniversary edition includes an introduction from the authors setting the work in context. This comprehensive textbook describes such remarkable effects as fast quantum algorithms, quantum teleportation, quantum cryptography and quantum error-correction. Quantum mechanics and computer science are introduced before moving on to describe what a quantum computer is, how it can be used to solve problems faster than 'classical' computers and its real-world implementation. It concludes with an in-depth treatment of quantum information. Containing a wealth of figures and exercises, this well-known textbook is ideal for courses on the subject, and will interest beginning graduate students and researchers in physics, computer science, mathematics, and electrical engineering.
Article
We introduce a protocol for quantum key distribution using three mutually non-orthogonal states. The protocol generates key bits most efficiently for three symmetric states. The generalized measurements which minimize the error probability and maximize the mutual information for such a system are known and can be implemented optically. We analyse eavesdropping strategies based on these optimal measurements.