implements Authentication of Quantum Messages
The Clifford Authentication Scheme is a non-interactive protocol for quantum authentication. It applies a random Clifford operator to the quantum message and an auxiliary register and then measures the auxiliary register to decide whether or not a eavesdropper has tampered the original quantum message.
The Clifford code encodes a quantum message by appending an auxiliary register with each qubit in state $|0\\\rangle$ and then applying a random Clifford operator on all qubits. The authenticator then measures only the auxiliary register. If all qubits in the auxiliary register are still in state $|0\\\rangle$, the authenticator accepts and decodes the quantum message. Otherwise, the original quantum message was tampered by a third party and the authenticator aborts the process.
acheck
No content has been added to this section, yet!
Input: $\\\rho$, $d$, $k$
Output: Quantum state $\\\rho’$ if the protocol accepts; fixed quantum state $\\\Omega$ if the protocol aborts
Encoding:
Mathematical Encoding Description:
Mathematically, the encoding process can be described by $$\\\mathcal{E}{k} : \\\rho \\\mapsto C{k}\\\left(\\\rho \\\otimes |0\\\rangle \\\langle 0|^{\\\otimes d}\\\right)C_{k}^{\\\dagger}.$$
Decoding:
Mathematical Decoding Description:
Mathematically, the decoding process is described by
$$\\\mathcal{D}k : \\\rho’ \\\mapsto \\\mathrm{tr}0\\\left(\\\mathcal{P}{\\\mathrm{acc}} C_k^{\\\dagger}(\\\rho’) C_k \\\mathcal{P}{\\\mathrm{acc}}^{\\\dagger}\\\right) \\\otimes |\\\mathrm{ACC}\\\rangle \\\langle \\\mathrm{ACC}| + \\\mathrm{tr}\\\left(\\\mathcal{P}{\\\mathrm{rej}} C_k^{\\\dagger}(\\\rho’) C_k \\\mathcal{P}{\\\mathrm{rej}}^{\\\dagger}\\\right) \\\Omega \\\otimes |\\\mathrm{REJ}\\\rangle \\\langle \\\mathrm{REJ}|.$$
In the above, $\\\mathrm{tr}0$ is the trace over the auxiliary register only, and $\\\mathrm{tr}$ is the trace over the quantum message system and the auxiliary system. Furthermore, $\\\mathcal{P}{\\\mathrm{acc}}$ and $\\\mathcal{P}{\\\mathrm{rej}}$ refer to the measurement projectors that determine whether the protocol accepts or aborts the received quantum message. It is $$\\\mathcal{P}{\\\mathrm{acc}} = \\\mathbb{1}^{\\\otimes n} \\\otimes |0\\\rangle \\\langle 0|^{\\\otimes d} \\\text{ and } \\\mathcal{P}{\\\mathrm{rej}} = \\\mathbb{1}^{\\\otimes (n+d)} – \\\mathcal{P}{\\\mathrm{acc}}.$$
No content has been added to this section, yet!
No content has been added to this section, yet!
implements Authentication of Quantum Messages
The Clifford Authentication Scheme is a non-interactive protocol for quantum authentication. It applies a random Clifford operator to the quantum message and an auxiliary register and then measures the auxiliary register to decide whether or not a eavesdropper has tampered the original quantum message.
The Clifford code encodes a quantum message by appending an auxiliary register with each qubit in state $|0\\\rangle$ and then applying a random Clifford operator on all qubits. The authenticator then measures only the auxiliary register. If all qubits in the auxiliary register are still in state $|0\\\rangle$, the authenticator accepts and decodes the quantum message. Otherwise, the original quantum message was tampered by a third party and the authenticator aborts the process.
acheck
No content has been added to this section, yet!
Input: $\\\rho$, $d$, $k$
Output: Quantum state $\\\rho\’$ if the protocol accepts; fixed quantum state $\\\Omega$ if the protocol aborts
Encoding:
Mathematical Encoding Description:
Mathematically, the encoding process can be described by $$\\\mathcal{E}{k} : \\\rho \\\mapsto C{k}\\\left(\\\rho \\\otimes |0\\\rangle \\\langle 0|^{\\\otimes d}\\\right)C_{k}^{\\\dagger}.$$
Decoding:
Mathematical Decoding Description:
Mathematically, the decoding process is described by
$$\\\mathcal{D}k : \\\rho\’ \\\mapsto \\\mathrm{tr}0\\\left(\\\mathcal{P}{\\\mathrm{acc}} C_k^{\\\dagger}(\\\rho\’) C_k \\\mathcal{P}{\\\mathrm{acc}}^{\\\dagger}\\\right) \\\otimes |\\\mathrm{ACC}\\\rangle \\\langle \\\mathrm{ACC}| + \\\mathrm{tr}\\\left(\\\mathcal{P}{\\\mathrm{rej}} C_k^{\\\dagger}(\\\rho\’) C_k \\\mathcal{P}{\\\mathrm{rej}}^{\\\dagger}\\\right) \\\Omega \\\otimes |\\\mathrm{REJ}\\\rangle \\\langle \\\mathrm{REJ}|.$$
In the above, $\\\mathrm{tr}0$ is the trace over the auxiliary register only, and $\\\mathrm{tr}$ is the trace over the quantum message system and the auxiliary system. Furthermore, $\\\mathcal{P}{\\\mathrm{acc}}$ and $\\\mathcal{P}{\\\mathrm{rej}}$ refer to the measurement projectors that determine whether the protocol accepts or aborts the received quantum message. It is $$\\\mathcal{P}{\\\mathrm{acc}} = \\\mathbb{1}^{\\\otimes n} \\\otimes |0\\\rangle \\\langle 0|^{\\\otimes d} \\\text{ and } \\\mathcal{P}{\\\mathrm{rej}} = \\\mathbb{1}^{\\\otimes (n+d)} – \\\mathcal{P}{\\\mathrm{acc}}.$$
No content has been added to this section, yet!
No content has been added to this section, yet!
implements Authentication of Quantum Messages
The Clifford Authentication Scheme is a non-interactive protocol for quantum authentication. It applies a random Clifford operator to the quantum message and an auxiliary register and then measures the auxiliary register to decide whether or not a eavesdropper has tampered the original quantum message.
The Clifford code encodes a quantum message by appending an auxiliary register with each qubit in state $|0\\\rangle$ and then applying a random Clifford operator on all qubits. The authenticator then measures only the auxiliary register. If all qubits in the auxiliary register are still in state $|0\\\rangle$, the authenticator accepts and decodes the quantum message. Otherwise, the original quantum message was tampered by a third party and the authenticator aborts the process.
acheck
No content has been added to this section, yet!
Input: $\\\rho$, $d$, $k$
Output: Quantum state $\\\rho\’$ if the protocol accepts; fixed quantum state $\\\Omega$ if the protocol aborts
Encoding:
Mathematical Encoding Description:
Mathematically, the encoding process can be described by $$\\\mathcal{E}{k} : \\\rho \\\mapsto C{k}\\\left(\\\rho \\\otimes |0\\\rangle \\\langle 0|^{\\\otimes d}\\\right)C_{k}^{\\\dagger}.$$
Decoding:
Mathematical Decoding Description:
Mathematically, the decoding process is described by
$$\\\mathcal{D}k : \\\rho\’ \\\mapsto \\\mathrm{tr}0\\\left(\\\mathcal{P}{\\\mathrm{acc}} C_k^{\\\dagger}(\\\rho\’) C_k \\\mathcal{P}{\\\mathrm{acc}}^{\\\dagger}\\\right) \\\otimes |\\\mathrm{ACC}\\\rangle \\\langle \\\mathrm{ACC}| + \\\mathrm{tr}\\\left(\\\mathcal{P}{\\\mathrm{rej}} C_k^{\\\dagger}(\\\rho\’) C_k \\\mathcal{P}{\\\mathrm{rej}}^{\\\dagger}\\\right) \\\Omega \\\otimes |\\\mathrm{REJ}\\\rangle \\\langle \\\mathrm{REJ}|.$$
In the above, $\\\mathrm{tr}0$ is the trace over the auxiliary register only, and $\\\mathrm{tr}$ is the trace over the quantum message system and the auxiliary system. Furthermore, $\\\mathcal{P}{\\\mathrm{acc}}$ and $\\\mathcal{P}{\\\mathrm{rej}}$ refer to the measurement projectors that determine whether the protocol accepts or aborts the received quantum message. It is $$\\\mathcal{P}{\\\mathrm{acc}} = \\\mathbb{1}^{\\\otimes n} \\\otimes |0\\\rangle \\\langle 0|^{\\\otimes d} \\\text{ and } \\\mathcal{P}{\\\mathrm{rej}} = \\\mathbb{1}^{\\\otimes (n+d)} – \\\mathcal{P}{\\\mathrm{acc}}.$$
No content has been added to this section, yet!
No content has been added to this section, yet!