2014
DOI: 10.1088/1054-660x/24/8/085202
|View full text |Cite
|
Sign up to set email alerts
|

Position-based quantum cryptography over untrusted networks

Abstract: In this paper, we propose quantum position-verification schemes where all the channels are untrusted except the position of the prover and distant reference stations of verifiers. We review and analyze the existing QPV schemes containing some pre-shared data between the prover and verifiers. Most of these schemes are based on non-cryptographic assumptions, that is, quantum/classical channels between the verifiers are secure. It seems impractical in the environment fully controlled by adversaries and would lead… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…1 Since then many works related to QLV have appeared in the literature, e.g. [8][9][10][11][12][13][14][15], largely focusing on information-theoretic security issues under different conditions. As I discuss more later, it is widely accepted that under known attacks, QLV is effectively secure.…”
mentioning
confidence: 99%
“…1 Since then many works related to QLV have appeared in the literature, e.g. [8][9][10][11][12][13][14][15], largely focusing on information-theoretic security issues under different conditions. As I discuss more later, it is widely accepted that under known attacks, QLV is effectively secure.…”
mentioning
confidence: 99%
“…Let's label BSM results of C as classical 2N-bit string . This measurement of C projects the qubits in possession of A and B into Bell states instantly, unknown to everyone at the moment 33 .…”
Section: Proposed Commitment Schemementioning
confidence: 99%
“…Now if C applies randomly chosen operators {( σ z σ x ) 1 , ( σ z ) 2 , ( σ x ) 3 } on qubits received from A, then the entangled states shared between A and C will become , unknown to everyone now. If B and his agent C share randomly prepared entangled state and C gets BSM results then swapped entangled state between A and B will be , unknown to everyone 33 . Now in the revealing phase, if A announces exact Bell states (her committed bit 1) and C announces his applied unitary operators and BSM results, then B can get exact swapped state , and so the values of He then gets the verified state .…”
Section: Security Analysis; N =mentioning
confidence: 99%
See 2 more Smart Citations