WO2013096952A1 - Unforgeable noise-tolerant quantum tokens - Google Patents

Unforgeable noise-tolerant quantum tokens Download PDF

Info

Publication number
WO2013096952A1
WO2013096952A1 PCT/US2012/071564 US2012071564W WO2013096952A1 WO 2013096952 A1 WO2013096952 A1 WO 2013096952A1 US 2012071564 W US2012071564 W US 2012071564W WO 2013096952 A1 WO2013096952 A1 WO 2013096952A1
Authority
WO
WIPO (PCT)
Prior art keywords
quantum
ticket
fidelity
verifiers
probability
Prior art date
Application number
PCT/US2012/071564
Other languages
French (fr)
Inventor
Fernando PASTAWSKI
J. Ignacio CIRAC
Liang Jiang
Norman YAO
Mikhail Lukin
Original Assignee
President And Fellows Of Harvard College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by President And Fellows Of Harvard College filed Critical President And Fellows Of Harvard College
Publication of WO2013096952A1 publication Critical patent/WO2013096952A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events

Abstract

A quantum ticket is defined by a unique serial number; and a set of qubits, each qubit encoding quantum information. The serial number and the set of qubits are distributed only among one or more trusted verifiers who require a tolerance fidelity Ftol in order to authenticate the token, where Ftol represents a minimum percentage of correct outcomes during authentication of the serial number and the set of qubits. The experimental fidelity Fexp for the quantum token is greater than the Ft0i set by the verifiers, so that an honest user of the quantum ticket who achieves Fexp is exponentially likely to be successfully authenticated when seeking authentication by any of the trusted verifiers. The forging fidelity Fforg for the quantum token is less than Ft0i, so that a dishonest user who achieves Fforg and attempts forgery of the quantum ticket is exponentially likely to fail to obtain authentication for his forged ticket.

Description

UNFORGEABLE NOISE-TOLERANT QUANTUM TOKENS
[001] CROSS-REFERENCE TO RELATED APPLICATIONS
[002] The present application is based upon, and claims the benefit of priority under 35 U.S.C. § 1 19, to co-pending United States Provisional Patent Application No. 61/579,805 (the "'805 provisional application"), filed December 23, 201 1 and entitled "Unforgeable Noise-Tolerant Quantum Tokens." The content of the '805 provisional application is incorporated herein by reference in its entirety as though fully set forth.
[003] BACKGROUND
[004] The laws of quantum mechanics, in particular the no-cloning theorem, guarantee that any attempt at counterfeiting a credit card, bank note, bill, coin, or other type of payment-related object will fail if the object is embedded with quantum information. However, this security holds only under perfect conditions, whereas in real life quantum information is subject to noise, decoherence, and operational imperfections, all of which provide loopholes that dishonest users can exploit.
[005] Because it is impossible to completely eliminate these imperfections, the development of secure "quantum money" - type protocols that can tolerate some noise and still remain secure is of practical importance.
[006] BRIEF DESCRIPTION OF THE DRAWINGS
[007] The drawings disclose illustrative embodiments. They do not set forth all embodiments. Other embodiments may be used in addition or instead.
[008] FIG. 1 illustrates a qticket (quantum ticket) in accordance with some embodiments of the present invention, and shows how soundness of the qticket can be proved.
[009] FIG. 2 schematically illustrates a quantum retrieval situation for a cv-qticket (classical verification-qticket) in accordance with some embodiments of the present invention. [010] FIG. 3 is a table showing one example of verification of a single cv-qticket.
[011] FIG. 4 illustrates a possible use of a cv-qticket to implement a quantum-protected credit card.
[012] FIG. 5 illustrates a dishonest user of a quantum credit card who attempts to copy a concert ticket, by assigning an identical serial number, to allow his henchman to enter using an alternate checkpoint gate.
[013] DESCRIPTION
[014] Illustrative embodiments are discussed in this application. It should be understood that the invention is not limited to the particular embodiments described. The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting, since the scope of the present invention will be limited only by the appended claims.
[015] Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Although any methods and systems similar or equivalent to those described herein can also be used in the practice or testing of the present invention, a limited number of the exemplary methods and systems are described herein.
[016] In the present application, the terms "qticket" and "quantum ticket" have the same meaning, and are used interchangeably.
[017] In the present application, the terms "qubit" and "quantum bit" have the same meaning, and are used interchangeably.
[018] In the present application, the terms "quantum token" and "quantum ticket" have the same meaning, and are used interchangeably.
[019] As known by the laws of quantum mechanics, the possession of an object carrying quantum information does not guarantee that the holder can extract a complete description. The reason is that, while measurements may provide partial access, they do not necessarily allow for a full reconstruction of the original quantum state, since the act of measurement itself may alter or perturb the quantum state per the Heisenberg uncertainty principle.
[020] "Quantum money" protocols, originally developed by Wiesner, are based on the realization that such quantum properties might allow for the design of a quantum "bank note" which is intrinsically and fundamentally immune to counterfeiting. Recent extensions to Wiesner's original "quantum money" protocol, in particular an extended protocol that makes it possible for quantum tokens to be authenticated via classical public communication with a trusted verifier.
[021] These extended protocols all assume that the verification process is noise-free and can occur perfectly. Practically, this is never the case, however. Any verification process has to condone a certain finite fraction of quantum bit (or qubit) failures, in actuality. With the addition of noise, the security itself of previous extended proposals is at issue.
[022] In some embodiments of the present application, quantum tickets are disclosed that ensure security of the protocol, as well as ensuring tolerance to finite errors associated with encoding, storage and coding of individual quantum bits. Each one of these qtickets is issued by a mint, and consists of a unique serial number and N component quantum states, p = ®,pj, where each p; is drawn uniformly at random from an orthogonal set of eigenstates.
[023] As one example, in some embodiments p, may be drawn from a set Q of polarization eigenstates of the Pauli spin operators. In these embodiments, Q is given by:
[024] 0 = {H->. l->. | + />. | - /> . |0) . | i ) } .
[025] It should be understood that in other embodiments, eigenstates other than the polarization eigenstates of the Pauli spin operators may be used, as long as the eigenstates are orthogonal. [026] The mint secretly stores a classical description of p, which is distributed only among one or more trusted verifiers. In order to redeem a qticket, the holder physically deposits it with a trusted verifier, who measures the qubits in the relevant basis. This verifier then requires a minimum fraction Ftoi of correct outcomes, i.e. correct matchings with the previously stored qubits, in order to authenticate the qticket. Following successful authentication or validation, the only information returned by the verifier is whether the qticket has been accepted or rejected.
[027] The soundness of the above-described qticket is the probability that an honest user is successfully verified or authenticated. Such a probability depends crucially on the experimental fidelities associated with single qubit encoding, storage, and decoding. For a given qubit pt, a map Mi can be defined, which characterizes the overall fidelity, beginning with the mint's encoding and ending with the verifier's validation. The average channel fidelity for each qubit pj is then given by:
[028] Fi = Ι /| βΙ∑Λ ΤΓ[Ρ/Λ/,.(ρ,)] .
[029] Using the above definition, the verification probability /?¾ of an honest user is: P" = jgj∑ TriP* cA ( p)] > 1 - e-W<^)
[030] peQ
[031] In the above mathematical expression for Ph, Pace represents the projector onto the subspace of valid qtickets, M— &,M^ Fe^p = 1 /Ν∑;·/* is the per qubit average experimental fidelity, and the relative entropy D is a measure of distinguishability between two binary probability distributions.
[032] In the above embodiments, as long as the average experimental fidelity Fexp associated with single qubit processes is greater than the tolerance fidelity Ftoi, an honest user is exponentially likely to be verified. In particular, the likelihood of successful verification is exponential in N, the number of initial qubits.
[033] In the above-described qticket, each qubit is considered to be in one of six possible states. In this case, more than one bit of information may be extracted by measuring the actual state, which is insufficient to recover the original classical description. As explained above, in other embodiments different sets of qubits or possible quantum states may be used or considered.
[034] As further described below, any attempts to forge two copies from a single qticket will lead at least one of the copies to be sufficiently imperfect, ultimately yielding its rejection at the hands of a trusted verifier, both tickets being imperfect.
[035] FIG. 1 illustrates a qticket (quantum ticket) in accordance with some embodiments of the present invention, and schematically shows how soundness of the qticket can be proved. In FIG. 1, an original qticket 1 10 has N qubits pt (indicated with reference numerals 1 1 1-1, 1 1 1-2, 1 11-N). Likewise, a cloned qticket 120 has N qubits , (indicated with reference numerals 122-1, 122-2, 122-N).
[036] For a given tolerance fidelity Ftoi, the qticket 1 10 having N qubits is only successfully authenticated if it contains at least Ft0iN valid qubits. However, for two counterfeit qtickets, not all valid qubits must coincide.
[037] To determine a tight security threshold, the counterfeiting of a single qticket 1 10 is considered, as depicted in FIG. 1. For a given tolerance fidelity Ftoi set by the trusted verifiers, a qticket (containing N qubits) is only accepted if at least FtoiN qubits are validated, i.e. the qticket 1 10 is only successfully authenticated if it contains at least Ft0|N valid qubits. However, for two counterfeit qtickets, not all valid qubits must coincide.
[038] In the event that a dishonest user attempts to generate two qtickets from a single valid original, each must contain a minimum of Ft0|N valid qubits to be authenticated, as shown in FIG. 1. In order for each counterfeit qticket to contain Fto|N valid qubits, a minimum of (2Ftoi - 1) N. qubits must have been perfectly cloned. Thus, for a set tolerance fidelity in order for a dishonest user to succeed, he or she must be able to emulate a qubit cloning fidelity of at least 2Ftoi - 1 ·
[039] So long as this fidelity is above a fidelity Fforg achievable for optimal qubit cloning, as allowed by the laws of quantum mechanics, a dishonest user is exponentially unlikely to succeed in getting his/her forged ticket authenticated:
Figure imgf000008_0001
[041 ] where T represents any completely positive trace preserving (CPTP) qticket counterfeiting map. To ensure 2Ftoi _ 1 > 23,the tolerance fidelity Ft0| must be greater than 5/6, which is precisely the average fidelity of copies produced by an optimal qubit cloning map.
[042] While in certain situations, an adversary may be able to sequentially engage in multiple verification rounds, the probability of successfully validating counterfeited qtickets grows at most quadratically in the number of such rounds, and hence, the likelihood of successful counterfeiting can remain exponentially small even for polynomially large numbers of verifications.
[043] The qticket 1 10 in FIG. 1 is a direct transfer qticket which is physically transferable to trusted verifiers, such as concert tickets, by way of example. In many situations, this assumption of physical deposition may either be impossible or undesirable.
[044] It has been shown that it remains possible, even remotely, for a holder to prove the validity of a token by responding to a set of "challenge" questions; these questions can only be successfully answered by measuring an authentic token. Core to this approach is to ensure that the challenge questions reveal no additional information about the quantum state of the token. The holder of a valid token should be capable of answering any single challenge question correctly yet be restricted to an exponentially small probability of satisfactorily answering two of them. [045] In some embodiments of the present application, classical verification quantum tickets (or "cv-qtickets") that are robust against noise and operational imperfections are implemented. In contrast to the case of bare qtickets, a cv-qticket holder will be expected to answer challenge questions and hence to measure qubits himself, or with a machine at a store. Alternatively, the cv-qticket holder or user may swipe his quantum credit card at a store, and the machine communicates via a classical channel to one or more trusted verifiers and may directly measure or answer the challenge questions.
[046] The possibility of a dishonest holder participating simultaneously in multiple remote verifications is contemplated. This possibility could in principle offer the counterfeiter an additional advantage with respect to the qticket scenario. In particular, certain measurement strategies, which may be chosen posterior to receiving a set of challenge questions, may yield an increased likelihood for multiple successful authentications.
[047] FIG. 2 schematically illustrates a quantum retrieval type situation for a cv-qticket in accordance with some embodiments of the present invention. In the situation illustrated in FIG. 2, two verifiers 220 and 222 ask a holder 210 complementary challenge questions. As further described below, a challenge question consists of requesting the holder 210 to measure each block of qubits along a basis chosen randomly among either X (shown as 231 in FIG. 2) or Z (shown as 232 in FIG. 2). In the illustrated situation, the optimal strategy for the holder 210 is to measure in an intermediate basis 215. Such a strategy saturates the tolerance threshold, which in the
/rev _ i + vI
illustrated case is given by: tot 2 .
[048] One example of a cv-qticket framework utilizes as a building block a set of eight possible two-qubit product states, each consisting of two polarization eigenstates (one along X and the other along Z): ϊΓίΛ m s = { 1°· -» >. |o. ->. 1 1 · -»). 1 1. -). | + . 0). I-, 0). I + . I >. 1 ) } [050] These states constitute a minimal set with the following properties: (1) Only preparation and measurement of qubit states is required; and (2) Each state enables the deterministic answering of either of two complementary challenge questions, for example, a request to measure both X polarizations or both Z polarizations, thereby automatically ensuring soundness in the case of perfect experimental fidelity. When attempting to use the state to answer two complementary challenges from independent verifiers, on average, only I + ' /
Figure imgf000010_0001
is correct. Thus, it is possible for a dishonest user to emulate an experimental fidelity (per qubit) of no more than
1 /2 + 1 / ¾ 0.85 with respect to each verifier.
[051] It should be understood that in other embodiments, the number of two-qubit product states can be different from eight, and orthogonal eigenstates other than polarization eigenstates may be used.
[052] In some embodiments, each cv-qticket may be envisioned as consisting of n blocks, each containing r qubit pairs, and thus, a total of n * r * 2 qubits. Again, each of the qubit pairs is chosen uniformly at random from the set S. A challenge question consists of requesting the holder to measure each block (of qubits) along a basis chosen randomly among either X or Z.
[053] FIG. 3 is a table showing an example of verification of a single cv (classical verification) - qticket. In the table set forth in FIG. 3, a cv-qticket with n = 2 and r = 4 is considered, totaling eight qubit pairs and Ft0i = 3/4 (just for illustrative purposes). In FIG. 3, the prepared qubit-pairs are chosen at random, as are the bank's requested measurement bases (for each block). The holder's answer has at most, a single error per block, which according to Ftoi = 3/4 is allowed. As explained above, secure cv-qtickets require ^"tnl ' /2 + 1 / N 8s ancj a larger number of constituent qubits.
[054] As depicted in the table in FIG. 3, a valid qubit pair (within a block) is one in which the holder correctly answers the orientation for the particular qubit (within the pair) that was prepared along the questioned basis. For a given tolerance threshold Fcv toi, an overall answer will only be deemed correct if at least Ftv w; r orientations within each of the n blocks are found valid. The motivation for taking blocks of 2r qubits is to exponentially suppress the probability that a counterfeiter provides more than 2 4 ^jf > i l ·*· I / V - correct answers among two complementary challenge blocks.
[055] In turn, because any two verifiers choose the questions for each block independently and at random, the probability that there exist no complementary blocks scales exponentially with the number of blocks as- 2~'\ By contrast, if one were to dismiss this block structure, an adversary would be able to emulate a larger ave age experimental fidelity (3/4 ··? I / y ¾ 0.93 ) choosing a measurement basis for each pair dependent on whether the corresponding requests are coinciding or complementary.
[056] By analogy to the direct-transfer qticket case described above, honest users of cv-qttckets are exponentially likely to be verified so long as Fesr> > Fcv !i;,j, In particular, because there now exist n blocks of qubits, each of which can be- thought of as an individual qticket (with r qubits), the probability Pe that the honest user will be successfull veri fied is given by:
[057]
[058] Mathematical proofs of cv-qticket security for the above-described cv-qticket based upon a generalized formalism of quantum retrieval games, in combination with a generalized Chemoff- Hoeffding bound, are provided in Exhibit ίϊ (the Supplemental Informal ion section) of the '805 provisional application, the contents of which have been incorporated by reference in. their entireties.
[059] So long as
Figure imgf000011_0001
> l~ ">" ? a dishonest user is exponentially unlikely to be authenticated by two independent veri fiers. The threshold I / - T ί / V b corresponds exactly to that achievable by either covariant qubit cloning or by measurement in an intermediate basis (as illustrated in FIG. 2), suggesting that both such strategies may be optimal.
[060] Likewise, by analogy to the direct-transfer qticket case described in conjunction with FIG. 1, a dishonest user of a cv-qticket is also exponentially likely to fail, with a probability pCV d given by:
Figure imgf000012_0001
[062] where v represents the number of repeated verification attempts.
[063] In the above equation, the factor of n ~ ' 2 results from a combinatorial statement accounting for the possibility of choosing which challenge question to answer first and then waiting for feedback from the verifier. Thus, so long as the hierarchy of fidelities is such that:
1 /2
Figure imgf000012_0002
< pcv to| < pexp> it is possible to mathematically prove both soundness and security of the cv-qtickets protocol. Further details of such proof is found in Exhibit II of the '805 provisional application, the contents of which are incorporated herein by reference in their entireties.
[064] In some embodiments, the primitives described above may be applied to practically relevant protocols. As one example, one might imagine a composite cv-qticket that allows for multiple verification rounds while also ensuring that the ticket cannot be split into two independently valid subparts. Such a construction may be used to create a quantum-protected credit card.
[065] FIG. 4 illustrates one example of a possible use of the above-described cv-qticket framework to implement a quantum-protected credit card. In the situation illustrated in FIG. 4, a user 420 has be cv-qticket issued by a quantum bank (shown as "Qbank" in FIG. 4) 410, in the form of a QBank card 422. A thief 430 clones two identical copies 432 of the Qbank card 422, and attempts to use the copies 432 in different stores, shown as store 1, store 2, and store 3.
[066] The classical communication that takes place with the issuer (for example a bank) to verify the cv-qticket, via challenge questions, may be intentionally publicized to a merchant who needs to be convinced of the card's validity. By contrast to modern credit card implementations, such a quantum credit card would be unforgeable and hence immune to fraudulent charges, as illustrated in FIG. 4. Unlike its classical counterpart, the quantum credit card would naturally be unforgeable, preventing thieves from being able to simply copy credit card information and perform remote purchases.
[067] FIG. 5 illustrates a situation where the trusted verifiers may not possess a secure communication channel with each other. In particular, FIG. 5 illustrates a dishonest user 460 who seeks to copy multiple concert tickets 462 and 472, i.e. to create more than one concert ticket with the same serial number. The dishonest user 460 attempts to make it possible for his henchman or friend 470 to enter the concert 450 at an alternate checkpoint gate 456 ("Gate 2"), different from his own checkpoint gate 455 ("Gate 1").
[068] Naively, each verifier (at gates 455 and 456, respectively) would be thought as being able to communicate with one another to prevent such abusive ticket cloning. However, such a safeguard can be overcome in the event that the communication among verifiers is either unsecured, unavailable, or severed (possibly by the dishonest user himself). The qticket is exempt from this type of attack because security is guaranteed even in the case of isolated verifiers.
[069] A classical solution would involve gate verifiers communicating amongst one another to ensure that each ticket serial number is only allowed entry a single time. As shown in FIG. 5, however, such a safeguard can be overcome in the event that communication has been severed. By contrast, a concert ticket based upon the proposed qticket primitive would be automatically secure against such a scenario. Indeed, the security of qtickets is guaranteed even when verifiers are assumed to be isolated. This kind of isolation may be especially useful for applications involving quantum identification tokens, where multiple verifiers may exist who are either unable or unwilling to communicate with one another.
[070] The above embodiments have described quantum primitives based upon single tokens. Natural extensions to the case of multiple identical quantum tickets open up the possibility of even more novel applications.
[071] In some embodiments of the present application, the above threshold results are extended to the case where c identical copies of the quantum ticket are issued. In this case, to ensure that the production of c + 1 valid tokens is exponentially improbable, the required threshold fidelity must
I !
be greater than (c+ l )lr+2) .
[072] The existence of such multiple identical tokens can provide a certain degree of anonymity for users and could be employed in primitives such as quantum voting.
[073] Rigorous mathematical proofs of the soundness and security of direct-transfer qtickets, described in conjunction with FIG. 1 , and of classically verifiable cv-tickets are provided in Exhibit II of the '805 provisional application, the contents of which have been incorporated by reference in their entireties.
[074] In some embodiments, a processing system may be configured and used to implement the methods, systems, and techniques described in the present application. The processing system may include, or may consist of, any type of microprocessor, nanoprocessor, microchip, or nanochip. The processing system may be selectively configured and/or activated by a computer program stored therein. It may include a computer-usable medium in which such a computer program may be stored, to implement the methods and systems described above. The computer-usable medium may have stored therein computer-usable instructions for the processing system. The methods and systems in the present application have not been described with reference to any particular programming language; thus it will be appreciated that a variety of platforms and programming languages may be used to implement the teachings of the present application. [075] In some embodiments, a computer-usable medium having stored therein computer-readable instructions for a processing system, wherein said instructions when executed by said processing system cause the processing system to measure a set of qubits in a quantum ticket and compare the measured values with stored values, and to authenticate the quantum ticket only if the correct outcomes are greater than a tolerance fidelity Ft0|.
[076] In sum, a novel class of secure "quantum money"-type primitives capable of tolerating realistic infidelities have been disclosed, and their tolerance to noise has been shown. The protocols proposed in the present application require only the ability to prepare, store, and measure single quantum bit memories, making their experimental realization accessible with current technologies.
[077] Nothing that has been stated or illustrated is intended to cause a dedication of any component, step, feature, object, benefit, advantage, or equivalent to the public. While the specification describes particular embodiments of the present disclosure, those of ordinary skill can devise variations of the present disclosure without departing from the inventive concepts disclosed in the disclosure. While certain embodiments have been described, it is to be understood that the concepts implicit in these embodiments may be used in other embodiments as well. In the present disclosure, reference to an element in the singular is not intended to mean "one and only one" unless specifically so stated, but rather "one or more." All structural and functional equivalents to the elements of the various embodiments described throughout this disclosure, known or later come to be known to those of ordinary skill in the art, are expressly incorporated herein by reference.

Claims

What is claimed is:
1. A quantum ticket, comprising a unique serial number; and
N component quantum qubits p = ®» *· ( = 1, ... N);
wherein the serial number and p are distributed only among one or more trusted verifiers who require a tolerance fidelity Ft0i in order to authenticate the token, Ft0i representing a minimum percentage of correct outcomes during authentication of S and p; wherein an experimental fidelity Fexp for the quantum token is greater than Floi; and wherein an honest user of the quantum ticket who achieves Fexp is exponentially likely to be successfully authenticated when seeking authentication by direct transfer to any of the trusted verifiers.
2. The quantum ticket of claim 1, wherein a forging fidelity Fforg for the quantum token is less than Ft0i, such that a dishonest user who achieves Fforg and attempts forgery of the quantum ticket is exponentially unlikely to be successfully authenticated when seeking authentication by direct transfer to any of the trusted verifiers, so that:
Fforg < Ftol < Fexp.
3. The quantum ticket of claim 1, wherein each one of the qubits are drawn at random from an orthogonal set of eigenstates.
4. The quantum ticket of claim 3, wherein the eigenstates are polarization eigenstates of the Pauli spin operators, and wherein the polarization eigenstates are given by:
{ |0) . | l ) . |+>. |-) . | + ) . | - > }
5. The quantum ticket of claim 1, wherein the quantum ticket has a soundness corresponding to a probability Ph that the honest user be successfully authenticated when seeking
authentication by direct transfer to any of the trusted verifiers, and wherein the probability Ph is given by:
1 ' pe<? — sJ ;
Pace represents a projector onto the subspace of valid qtickets;
Figure imgf000017_0001
is a per qubit average experimental fidelity; and
relative entropy D is a measure of distinguishabihty between two binary probability distributions.
6. The quantum ticket of claim 2, wherein the quantum ticket has a security corresponding to a probability Pa that a dishonest user fails to have his forged ticket authenticated when seeking authentication by direct transfer to any of the trusted verifiers, and wherein the probability Pd is given by:
P' = ϊ½∑ Tr,'Pa¾ r(p)J ^Λ'ΰ 2F--,1|2/·v
7. The quantum ticket of claim 2, wherein for a given FIOi, a minimum forging fidelity Fforg that a dishonest user must emulate, in order to have a ticket that he forged successfully authenticated, is given by:
Fforg < 2 Ftoi - 1.
8. The quantum ticket of claim 2, wherein Ftoi and Ff0rg are defined so that any attempt by any user at forging more than one the quantum ticket leads to both of the copies being sufficiently imperfect so as to be rejected by all the trusted verifiers.
9. The quantum ticket of claim 2, wherein upon issuance of c identical copies of the quantum ticket, a tolerance fidelity Ft0i that is required in order to exclude the possibility that a (c + l)th copy of the quantum ticket be successfully verified, is greater than:
1 !__
1 (r- l Hc-^2 ) .
10. The quantum ticket of claim 9, wherein a probability jD c_>c+/ that a (c + 1)Λ copy of the quantum ticket is successfully verified, after c identical copies of the quantum ticket have been issued, is less than or equal to: e -NDUc+ l )Ftt4-c% )
1 1. A quantum ticket, comprising:
a unique serial number; and
a set containing a plurality N of two-qubit product states, each state allowing for a deterministic answering of either one of two complementary challenge questions, the serial number and the set of two-qubit product states distributed only among one or more trusted verifiers who require a tolerance fidelity Fcv t0| in order to remotely verify the token through a classical channel; wherein an experimental fidelity Fexp for the classically verifiable quantum token is greater than Fcv t0i; and wherein an honest user of the quantum ticket who achieves Fexp is exponentially likely to be successfully authenticated when seeking remote verification of the ticket by
communication with any of the trusted verifiers over a classical channel.
12. The quantum ticket of claim 1 1 , wherein the quantum ticket has a soundness corresponding to a probability PCVh that the honest user be successfully authenticated when seeking remote authentication from any of the trusted verifiers through a classical channel, and wherein the probability PCVh is given by:
Figure imgf000019_0001
13. The quantum ticket of claim 1 1 , wherein a dishonest user is exponentially unlikely to be authenticated by two independent verifiers, as long as ^tni > W^.
14. The quantum ticket of claim 13, wherein the quantum ticket has a security corresponding to a probability PCV d that a dishonest user fails to obtain authentication for a forged ticket, when seeking remote authentication from any of the trusted verifiers through a classical channel, and wherein the probability PCV d is given by:
Figure imgf000019_0002
15. The quantum ticket of claim 1 1 , comprising a quantum credit card.
16. The quantum ticket of claim 1 1 , wherein each one of the plurality N of two-qubit product states comprises two orthogonal eigenstates along mutually perpendicular directions.
17. The quantum ticket of claim 16, wherein N = 8, and wherein each one of the two-qubit product states comprises two polarization eigenstates along mutually perpendicular directions; and wherein the set of polarization eigenstates is given by:
{ |0. -}-> . |0. -) . | 1 . + > . | I . -) . I + . 0) . I -. 0) . I - I ) , H i ) } .
18. A method comprising: measuring a set of qubits in a quantum ticket and comparing the measured values with previously stored values, and authenticating the quantum ticket only if the percentage of correct outcomes are greater than a tolerance fidelity Ft0i; wherein the previously stored values have been distributed only to one or more trusted verifiers.
19. The method of claim 18, wherein the quantum ticket has an experimental fidelity Fexp that is greater than Ftoi, so that an honest user of the quantum ticket who achieves Fexp is exponentially likely to be successfully authenticated when seeking authentication from the trusted verifiers.
20. The method of claim 18, wherein the quantum ticket has a forging fidelity Fforg that is less than Ft0i, so that a dishonest user who achieves Fforg and attempts forgery of the quantum ticket is exponentially unlikely to be authenticated when seeking authentication from any of the trusted verifiers.
21. The method of claim 20, wherein Ff0rg is a maximum possible fidelity of a forged ticket allowed by quantum mechanics.
22. A computer-usable medium having stored therein computer-readable instructions for a processing system, wherein said instructions when executed by said processing system cause the processing system to measure a set of qubits in a quantum ticket and compare the measured values with stored values, and to authenticate the quantum ticket only if the correct outcomes are greater than a tolerance fidelity F(0|.
PCT/US2012/071564 2011-12-23 2012-12-23 Unforgeable noise-tolerant quantum tokens WO2013096952A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161579805P 2011-12-23 2011-12-23
US61/579,805 2011-12-23

Publications (1)

Publication Number Publication Date
WO2013096952A1 true WO2013096952A1 (en) 2013-06-27

Family

ID=48669607

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/071564 WO2013096952A1 (en) 2011-12-23 2012-12-23 Unforgeable noise-tolerant quantum tokens

Country Status (1)

Country Link
WO (1) WO2013096952A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050157875A1 (en) * 2002-09-26 2005-07-21 Tsuyoshi Nishioka Crytographic communication apparatus
US20050249352A1 (en) * 2004-04-13 2005-11-10 Sora Choi Quantum-key distribution method between a plurality of users or groups
US20060129486A1 (en) * 2004-07-30 2006-06-15 Kenji Ohkuma Quantum cash system and quantum cash apparatus
US20070028113A1 (en) * 1999-12-07 2007-02-01 Moskowitz Scott A Systems, methods and devices for trusted transactions
US20100212004A1 (en) * 2009-02-18 2010-08-19 Nokia Corporation Method and apparatus for providing enhanced service authorization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070028113A1 (en) * 1999-12-07 2007-02-01 Moskowitz Scott A Systems, methods and devices for trusted transactions
US20050157875A1 (en) * 2002-09-26 2005-07-21 Tsuyoshi Nishioka Crytographic communication apparatus
US20050249352A1 (en) * 2004-04-13 2005-11-10 Sora Choi Quantum-key distribution method between a plurality of users or groups
US20060129486A1 (en) * 2004-07-30 2006-06-15 Kenji Ohkuma Quantum cash system and quantum cash apparatus
US20100212004A1 (en) * 2009-02-18 2010-08-19 Nokia Corporation Method and apparatus for providing enhanced service authorization

Similar Documents

Publication Publication Date Title
CN106533696B (en) Identity identifying method, certificate server and user terminal based on block chain
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
US10396985B1 (en) Federated identity management based on biometric data
EP3896638A1 (en) Distributed transaction propagation and verification system
CN109104413B (en) Method for solving intersection of private data for secure multi-party computation and verification method
CN104392534B (en) Electronic voting method and device based on finger vein feature recognition
CN100550738C (en) A kind of authentication method of distributed network and system
US20090183248A1 (en) Two-way error correction for physical tokens
KR102332226B1 (en) Blockchain network system being capable of verifying a blockchain ledger and method for verifying a blockchain ledger
CN108111314A (en) The generation of digital certificate and method of calibration and equipment
CN109767215A (en) A kind of online block chain identity identifying method based on a variety of private key storage modes
CN110135992A (en) The acquisition methods and acquisition device of block chain network Fabric-CA digital certificate
CN110310115A (en) A method of realizing that distributed account book is extending transversely based on fragment mechanism
CN110417790A (en) Block chain system of real name queuing system and method
CN104967553B (en) Method for message interaction and relevant apparatus and communication system
Georgiou et al. New constructions for quantum money
CN110363533A (en) A kind of real-name authentication system and method
CN101771696A (en) Multi-layer data mapping authentication system
CN113744036B (en) Quantum check transaction method based on blockchain digital signature
Pranitha et al. Utilization of blockchain in e-voting system
US20140358793A1 (en) Unforgeable Noise-Tolerant Quantum Tokens
CN110111477A (en) A kind of lottery information anti-counterfeiting authentication method and system based on Information hiding
CN104091191B (en) A kind of efficiently and effectively false proof authenticating method
WO2013096952A1 (en) Unforgeable noise-tolerant quantum tokens
Zhang et al. Anonymous transferable conditional e-cash

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12860881

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12860881

Country of ref document: EP

Kind code of ref document: A1