Anonymous Quantum Communication
نویسندگان
چکیده
We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corrupt participant can cause the protocol to abort, the quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).
منابع مشابه
Computing on Anonymous Quantum Network
This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available. It is proved that the leader election problem can exactly (i.e., without error in bounded time) be solved with at most the same complexity up to a constant factor as that of exactly computing symmetric functions ...
متن کاملPrivacy Preserving Quantum Anonymous Transmission via Entanglement Relay
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves ...
متن کاملSimpler Exact Leader Election via Quantum Reduction
The anonymous network model was introduced by Angluin in [STOC ’80, pages 82-93] to understand the fundamental properties of distributed computing by examining how much each party in a network needs to know about its own identity and the identities of other parties. In this model, all parties with the same number of communication links are identical. When studying the model, the problem of elec...
متن کاملRole of negative dielectric and optical quantum dot waveguiding methods in communication
While the application of optical and photonic technologies in the communications, computing, medicine and industrial manufacturing has been growing rapidly, the miniaturization of these technologies has been slow due to the limitation on the diffraction. However, the developments of nanoscale components and guiding methods are continuing with a rapid pace. Since waveguiding is a fundamental iss...
متن کاملPost-Quantum Secure Onion Routing
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous users and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this ...
متن کامل