implements Anonymous Transmission
This example protocol implements the task of Anonymous Transmission in a multi-node quantum network. The protocol uses an untrusted $n$-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called $\\\epsilon$-anonymity.
This verified GHZ-based quantum anonymous transmission protocol is based on the work of [1], which uses the following subroutines and protocols:
The protocol for quantum anonymous transmission consists of the following steps:
If verification is chosen, a player is chosen to run Verification, using $\\\log _{2}n$ repetitions of RandomBit. If the test passes, the protocol goes back to the State distribution stage and runs again. If the test fails, the players abort.
If anonymous transmission is chosen, the players run Anonymous Entanglement, establishing an anonymous entanglement link between $\\\mathcal {S}$ and $\\\mathcal {R}$. $\\\mathcal {S}$ then teleports the message state $ |\\\psi \\\rangle$ to $\\\mathcal {R}$ using the established anonymous entanglement. The classical message $m$ associated with teleportation is also sent anonymously.
No content has been added to this section, yet!
The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.
Let $C_{\\\epsilon}$ be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most $\\\sqrt{1 – \\\epsilon^2}$. Then,
$$
P[C_{\\\epsilon}] \\\leq 2^{-q} \\\frac{4n}{1 – \\\sqrt{1 – \\\epsilon^2}}
$$
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.
If the state used for anonymous transmission is of fidelity at least $\\\sqrt{1 – \\\epsilon^2}$ with the GHZ state,
$$
P_{\\\text{guess}}[\\\mathcal{S} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
$$
P_{\\\text{guess}}[\\\mathcal{R} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
where $\\\mathcal{A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries.
Input: Security parameter $q$.
Goal: $\\\mathcal{S}$ sends message qubit $|\\\psi\\\rangle$ to $\\\mathcal{R}$ with $\\\epsilon$-anonymity.
If at any point in the protocol, $\\\mathcal{S}$ realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.
Input: ${x_i}_{i=1}^{n}$.
Goal: Each player gets $y_i = \\\bigoplus_{i=1}^{n} x_i$.
Input: ${x_i}_{i=1}^{n}$, security parameter $q$
Goal: Each player gets $y_i = \\\bigvee_{i=1}^{n} x_i$
Input: Security parameter $q$, $\\\mathcal{S}$’s choice of $\\\mathcal{R}$ is player $r$.
Goal: $\\\mathcal{S}$ notifies $\\\mathcal{R}$.
For each player $i$:
Input: All: parameter $q$. $\\\mathcal{S}$: distribution $D$.
Goal: $\\\mathcal{S}$ chooses a bit according to $D$.
The verification subroutine uses the verification protocol.
Input: $n$ players share a GHZ state.
Goal: Anonymous transmission of quantum message $|\\\psi\\\rangle$ from $\\\mathcal{S}$ to $\\\mathcal{R}$.
No content has been added to this section, yet!
implements Anonymous Transmission
This example protocol implements the task of Anonymous Transmission in a multi-node quantum network. The protocol uses an untrusted $n$-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called $\\\epsilon$-anonymity.
This verified GHZ-based quantum anonymous transmission protocol is based on the work of [1], which uses the following subroutines and protocols:
The protocol for quantum anonymous transmission consists of the following steps:
If verification is chosen, a player is chosen to run Verification, using $\\\log _{2}n$ repetitions of RandomBit. If the test passes, the protocol goes back to the State distribution stage and runs again. If the test fails, the players abort.
If anonymous transmission is chosen, the players run Anonymous Entanglement, establishing an anonymous entanglement link between $\\\mathcal {S}$ and $\\\mathcal {R}$. $\\\mathcal {S}$ then teleports the message state $ |\\\psi \\\rangle$ to $\\\mathcal {R}$ using the established anonymous entanglement. The classical message $m$ associated with teleportation is also sent anonymously.
No content has been added to this section, yet!
The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.
Let $C_{\\\epsilon}$ be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most $\\\sqrt{1 – \\\epsilon^2}$. Then,
$$
P[C_{\\\epsilon}] \\\leq 2^{-q} \\\frac{4n}{1 – \\\sqrt{1 – \\\epsilon^2}}
$$
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.
If the state used for anonymous transmission is of fidelity at least $\\\sqrt{1 – \\\epsilon^2}$ with the GHZ state,
$$
P_{\\\text{guess}}[\\\mathcal{S} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
$$
P_{\\\text{guess}}[\\\mathcal{R} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
where $\\\mathcal{A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries.
Input: Security parameter $q$.
Goal: $\\\mathcal{S}$ sends message qubit $|\\\psi\\\rangle$ to $\\\mathcal{R}$ with $\\\epsilon$-anonymity.
If at any point in the protocol, $\\\mathcal{S}$ realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.
Input: ${x_i}_{i=1}^{n}$.
Goal: Each player gets $y_i = \\\bigoplus_{i=1}^{n} x_i$.
Input: ${x_i}_{i=1}^{n}$, security parameter $q$
Goal: Each player gets $y_i = \\\bigvee_{i=1}^{n} x_i$
Input: Security parameter $q$, $\\\mathcal{S}$’s choice of $\\\mathcal{R}$ is player $r$.
Goal: $\\\mathcal{S}$ notifies $\\\mathcal{R}$.
For each player $i$:
Input: All: parameter $q$. $\\\mathcal{S}$: distribution $D$.
Goal: $\\\mathcal{S}$ chooses a bit according to $D$.
The verification subroutine uses the verification protocol.
Input: $n$ players share a GHZ state.
Goal: Anonymous transmission of quantum message $|\\\psi\\\rangle$ from $\\\mathcal{S}$ to $\\\mathcal{R}$.
No content has been added to this section, yet!
implements Anonymous Transmission
This example protocol implements the task of Anonymous Transmission in a multi-node quantum network. The protocol uses an untrusted $n$-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called $\\\epsilon$-anonymity.
This verified GHZ-based quantum anonymous transmission protocol is based on the work of [1], which uses the following subroutines and protocols:
The protocol for quantum anonymous transmission consists of the following steps:
If verification is chosen, a player is chosen to run Verification, using $\\\log _{2}n$ repetitions of RandomBit. If the test passes, the protocol goes back to the State distribution stage and runs again. If the test fails, the players abort.
If anonymous transmission is chosen, the players run Anonymous Entanglement, establishing an anonymous entanglement link between $\\\mathcal {S}$ and $\\\mathcal {R}$. $\\\mathcal {S}$ then teleports the message state $ |\\\psi \\\rangle$ to $\\\mathcal {R}$ using the established anonymous entanglement. The classical message $m$ associated with teleportation is also sent anonymously.
No content has been added to this section, yet!
The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.
Let $C_{\\\epsilon}$ be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most $\\\sqrt{1 – \\\epsilon^2}$. Then,
$$
P[C_{\\\epsilon}] \\\leq 2^{-q} \\\frac{4n}{1 – \\\sqrt{1 – \\\epsilon^2}}
$$
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.
If the state used for anonymous transmission is of fidelity at least $\\\sqrt{1 – \\\epsilon^2}$ with the GHZ state,
$$
P_{\\\text{guess}}[\\\mathcal{S} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
$$
P_{\\\text{guess}}[\\\mathcal{R} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
where $\\\mathcal{A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries.
Input: Security parameter $q$.
Goal: $\\\mathcal{S}$ sends message qubit $|\\\psi\\\rangle$ to $\\\mathcal{R}$ with $\\\epsilon$-anonymity.
If at any point in the protocol, $\\\mathcal{S}$ realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.
Input: ${x_i}_{i=1}^{n}$.
Goal: Each player gets $y_i = \\\bigoplus_{i=1}^{n} x_i$.
Input: ${x_i}_{i=1}^{n}$, security parameter $q$
Goal: Each player gets $y_i = \\\bigvee_{i=1}^{n} x_i$
Input: Security parameter $q$, $\\\mathcal{S}$’s choice of $\\\mathcal{R}$ is player $r$.
Goal: $\\\mathcal{S}$ notifies $\\\mathcal{R}$.
For each player $i$:
Input: All: parameter $q$. $\\\mathcal{S}$: distribution $D$.
Goal: $\\\mathcal{S}$ chooses a bit according to $D$.
The verification subroutine uses the verification protocol.
Input: $n$ players share a GHZ state.
Goal: Anonymous transmission of quantum message $|\\\psi\\\rangle$ from $\\\mathcal{S}$ to $\\\mathcal{R}$.
No content has been added to this section, yet!
implements Anonymous Transmission
This example protocol implements the task of Anonymous Transmission in a multi-node quantum network. The protocol uses an untrusted $n$-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called $epsilon$-anonymity.
This verified GHZ-based quantum anonymous transmission protocol is based on the work of [1], which uses the following subroutines and protocols:
The protocol for quantum anonymous transmission consists of the following steps:
If verification is chosen, a player is chosen to run Verification, using $log _{2}n$ repetitions of RandomBit. If the test passes, the protocol goes back to the State distribution stage and runs again. If the test fails, the players abort.
If anonymous transmission is chosen, the players run Anonymous Entanglement, establishing an anonymous entanglement link between $mathcal {S}$ and $mathcal {R}$. $mathcal {S}$ then teleports the message state $ |psi rangle$ to $mathcal {R}$ using the established anonymous entanglement. The classical message $m$ associated with teleportation is also sent anonymously.
No content has been added to this section, yet!
The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.
Let $C_{epsilon}$ be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most $sqrt{1 – epsilon^2}$. Then,
$$
P[C_{\\\epsilon}] \\\leq 2^{-q} \\\frac{4n}{1 – \\\sqrt{1 – \\\epsilon^2}}
$$
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.
If the state used for anonymous transmission is of fidelity at least $sqrt{1 – epsilon^2}$ with the GHZ state,
$$
P_{\\\text{guess}}[\\\mathcal{S} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
$$
P_{\\\text{guess}}[\\\mathcal{R} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
where $mathcal{A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries.
Input: Security parameter $q$.
Goal: $mathcal{S}$ sends message qubit $|psirangle$ to $mathcal{R}$ with $epsilon$-anonymity.
If at any point in the protocol, $mathcal{S}$ realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.
Input: ${x_i}_{i=1}^{n}$.
Goal: Each player gets $y_i = bigoplus_{i=1}^{n} x_i$.
Input: ${x_i}_{i=1}^{n}$, security parameter $q$
Goal: Each player gets $y_i = bigvee_{i=1}^{n} x_i$
Input: Security parameter $q$, $mathcal{S}$’s choice of $mathcal{R}$ is player $r$.
Goal: $mathcal{S}$ notifies $mathcal{R}$.
For each player $i$:
Input: All: parameter $q$. $mathcal{S}$: distribution $D$.
Goal: $mathcal{S}$ chooses a bit according to $D$.
The verification subroutine uses the verification protocol.
Input: $n$ players share a GHZ state.
Goal: Anonymous transmission of quantum message $|psirangle$ from $mathcal{S}$ to $mathcal{R}$.
No content has been added to this section, yet!
implements Anonymous Transmission
This example protocol implements the task of Anonymous Transmission in a multi-node quantum network. The protocol uses an untrusted $n$-partite GHZ state to enable two nodes, Sender and Receiver, to establish a link which they use to transmit a quantum message. In addition to adversarial nodes, the source of the GHZ state may be controlled by an adversary. To address this, the protocol includes verification of the GHZ state. It incorporates a reduced fidelity GHZ state used for anonymous transmission, resulting in a notion of anonymity for imperfect scenarios called $epsilon$-anonymity.
This verified GHZ-based quantum anonymous transmission protocol is based on the work of [1], which uses the following subroutines and protocols:
The protocol for quantum anonymous transmission consists of the following steps:
If verification is chosen, a player is chosen to run Verification, using $log _{2}n$ repetitions of RandomBit. If the test passes, the protocol goes back to the State distribution stage and runs again. If the test fails, the players abort.
If anonymous transmission is chosen, the players run Anonymous Entanglement, establishing an anonymous entanglement link between $mathcal {S}$ and $mathcal {R}$. $mathcal {S}$ then teleports the message state $ |psi rangle$ to $mathcal {R}$ using the established anonymous entanglement. The classical message $m$ associated with teleportation is also sent anonymously.
No content has been added to this section, yet!
The pseudocode given below implements anonymous transmission of a quantum message, incorporating a verification stage. Further, the following analysis considers anonymous transmission with a reduced fidelity state rather than a perfect GHZ state.
Let $C_{epsilon}$ be the event that the protocol does not abort and the state used for anonymous transmission is such that, no matter what operation the adversarial players do to their part, the fidelity of the state with the GHZ state is at most $sqrt{1 – epsilon^2}$. Then,
$$
P[C_{\\\epsilon}] \\\leq 2^{-q} \\\frac{4n}{1 – \\\sqrt{1 – \\\epsilon^2}}
$$
By doing many repetitions of the protocol, the honest players can ensure that this probability is negligible.
If the state used for anonymous transmission is of fidelity at least $sqrt{1 – epsilon^2}$ with the GHZ state,
$$
P_{\\\text{guess}}[\\\mathcal{S} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
$$
P_{\\\text{guess}}[\\\mathcal{R} | C, \\\mathcal{S} \\\notin \\\mathcal{A}] \\\leq \\\frac{1}{n – t} + \\\epsilon
$$
where $mathcal{A}$ is the subset of $t$ adversaries among $n$ nodes and $C$ is the register that contains all classical and quantum side information accessible to the adversaries.
Input: Security parameter $q$.
Goal: $mathcal{S}$ sends message qubit $|psirangle$ to $mathcal{R}$ with $epsilon$-anonymity.
If at any point in the protocol, $mathcal{S}$ realises someone does not follow the protocol, she stops behaving like the Sender and behaves as any player.
Input: ${x_i}_{i=1}^{n}$.
Goal: Each player gets $y_i = bigoplus_{i=1}^{n} x_i$.
Input: ${x_i}_{i=1}^{n}$, security parameter $q$
Goal: Each player gets $y_i = bigvee_{i=1}^{n} x_i$
Input: Security parameter $q$, $mathcal{S}$’s choice of $mathcal{R}$ is player $r$.
Goal: $mathcal{S}$ notifies $mathcal{R}$.
For each player $i$:
Input: All: parameter $q$. $mathcal{S}$: distribution $D$.
Goal: $mathcal{S}$ chooses a bit according to $D$.
The verification subroutine uses the verification protocol.
Input: $n$ players share a GHZ state.
Goal: Anonymous transmission of quantum message $|psirangle$ from $mathcal{S}$ to $mathcal{R}$.
No content has been added to this section, yet!