A Quantum Approach to News Verification from the Perspective of a News Aggregator
Abstract
:1. Introduction
Organization
2. Background and Notation
2.1. EPR Pairs
2.2. The State
3. Hypotheses and Setting
3.1. The Protagonists
- (H1)
- A trusted quantum source There exists a trusted quantum source that generates single qubits in the state and EPR pairs in the state. The source also distributes these qubits to all other players through appropriate quantum channels, according to the entanglement distribution scheme outlined in the forthcoming Definition 1.
- (H2)
- News verifiers. There exist m special players that are called news verifiers. Their mission is to fact-check every piece of news and classify it as true or fake. In our game, this role is undertaken by Alice and her clones, who are denoted by Alice1, …, Alicem. The news verifiers work independently of each other, and no communication, classical or quantum, takes place between any two of them.
- (H3)
- News aggregators. There are also n players that are called news aggregators, whose purpose is to gather and disseminate news that have been certified as true. This role is assumed by Bob and his clones that are denoted by Bob1, …, Bobn, where, typically, .
3.2. The Connections among the Players
- (H4)
- It is more realistic to consider that each Alice clone is not responsible for all news aggregators, but only for a specific group of news aggregators that are under her supervision. Henceforth, we shall assume that each , , is connected via pairwise authenticated classical channels to a specific subset of news aggregators who constitute her active network, and is their coordinator. These aggregators are ’s receivers; their cardinality is denoted by and they are designated by , , …, .
- (H5)
- Each , , sends two things to every , , in her active network:
- ⋄
- The result of the verification check, denoted by .
- ⋄
- A proof sequence, denoted by , which is intended to convince that she is honest.
The situation is visually depicted in Figure 1. - (H6)
- All news aggregators that belong to the same active network are connected via pairwise authenticated classical channels. This enables them to exchange, whenever they deem necessary, the verification outcomes and the proof sequences they received from their coordinator. This action can be considered as an extra layer of verification and an indirect way in which aggregators can assess the honesty of other aggregators, as well as the honesty of their coordinator. This topology is shown in Figure 2. We clarify that aggregators that have no coordinator in common, do not communicate in any way.
- (H7)
- Every news aggregator is responsible for maintaining the reputation system outlined below, independently, and in parallel with every other news aggregator:
- ⋄
- A news ranking system that characterizes news as either true or fake.
- ⋄
- A reputation catalog that reflects the personal assessment of the aggregator regarding every other player (both verifier and aggregator) involved in information exchange.
News deemed as fake must be appropriately flagged as such, so that the public is made aware of this. The reputation catalog takes the form of two lists containing the unreliable verifiers and aggregators.
4. The Quantum News Verification Algorithm
- ⋄
- If the news in question passed the verification check, then Alice sends via the classical channel the bit 1 to every Bob in her active network to signify its credibility. Additionally, she sends a personalized proof, which is a sequence of bits, to each of her agents. The important thing here is that for each Bob, the proof is different because it is constructed specifically for him.
- ⋄
- Symmetrically, if the news failed to pass the check, Alice sends via the classical channel the bit 0 to every agent in her active network to indicate that it is fake, together with a personalized proof.
4.1. The Entanglement Distribution Phase
- ⋄
- one verification sequence that is sent to and has the form
- ⋄
- verification sequences , , …, sent to , , …, , respectively, that have the form
- (I1)
- , , is linked to each one of her agents , , …, because her verification sequence is entangled with their verification sequences , , …, .
- (I2)
- All these quantum sequences are made up of d in total -tuples of qubits.
- (I3)
- Sequence is made up exclusively from entangled qubits.
- (I4)
- In , the qubits in position 1, namely , , …, , are entangled with the corresponding qubits , , …, of the sequence that belongs to . This is because and , , belong to the same pair by construction.
- (I5)
- For precisely the same reason, the qubits in position , i.e., , , …, , are entangled with the corresponding qubits , , …, of the sequence owned by .
- (I6)
- In every sequence , , the qubits , , that occupy the position in each -tuple, are entangled with the corresponding qubits of . All other qubits are in the state.
4.2. Entanglement Validation Phase
4.3. The News Verification Phase
- ⋄
- The result of the verification check, denoted by , which is just a single bit. If the news is true, then is just the bit 1, whereas if the news is fake, is the bit 0.
- ⋄
- A proof sequence , denoted by , which is intended to convince that she is honest. Each proof sequence is a sequence of symbols from , i.e., . It is critical that these proof sequences be personalized, which effectively means they must be different for every news aggregator. Their construction is described below.
- –
- If , the proof sequence sent to news aggregator , , also designated by for emphasis, has the explicit form shown below:
- –
- Symmetrically, if , the proof sequence sent to , , denoted by for emphasis, has the following explicit form:
- (S1)
- An unreliable and dishonest sends to the verification outcome , but the latter is accompanied with the wrong proof sequence .
- (S2)
- A malicious news aggregator, say (), falsely claims that he received from the opposite verification outcome accompanied by a consistent proof sequence.
- (S3)
- An insidious deliberately spreads disinformation and confusion by sending opposite verification outcomes and to and (), using consistent proof sequences and in each case.
- Measuring a pair of qubits in the state will result in both qubits collapsing in state with probability , or in state with probability . This implies that the expected number of the and bits with value is . Consequently, the expected number of tuples in (and in ) in which the bit in the position has value is . Thus, irrespective of whether the verification outcome is 1 or 0, the expected number of tuples in in which the bit in the position has value is , which proves property (19). This also means that the expected number of the remaining tuples in , which are cryptic tuples according to Definition 3, is also .
- Measuring two pairs of qubits, both in the state, will result in both qubits of the first pair collapsing in state with probability , or in state with probability , and, independently, both qubits of the second pair collapsing in state with probability , or in state with probability . This means that the expected number of the and bits with values “00”, “01”, “10”, and “11” is . Consequently, the expected number of tuples in in which the bits in positions k and contain any one of the aforementioned combinations is . Thus, irrespective of whether the verification outcome is 1 or 0, the expected number of tuples in in which the bits in positions k and are or is , which proves property (20).
- i, , is the index of ;
- k, , is the index of ;
- is the verification outcome that sends to ;
- is the proof sequence that sends to ;
- is the classical bit sequence of .
- Initially, received from the verification outcome and the consistent proof sequence ;
- Subsequently, received from the opposite verification outcome and the sequence as proof.
- ⋄
- From , , the verification outcome and the sequence as proof;
- ⋄
- From () the opposite verification outcome and the sequence as proof.
- (Fact1)
- The indices of the -tuples of that contain in position , which includes those that also contain in position k, and those that also contain in position k, i.e., the set
- (Fact2)
- The indices of the cryptic tuples of , i.e., the set .
- Including a tuple where the bit in the position has the wrong value;
- Using fewer than expected tuples with in position .
- (M1)
- Place in the position of a wrong -tuple not contained in .
- (M2)
- Place in the position of a wrong -tuple that does appear in .
- i, , is the index of ;
- k, , is the index of ;
- , , is the index of ;
- is the verification outcome that has sent to ;
- is the proof sequence that has sent to ;
- is the verification outcome that claims he received from ;
- is the proof sequence that claims he received from .
- i, , is the index of .
- k, , is the index of .
- QNVA is the instance of QVNA executed by .
- and denote the lists of malicious news aggregators and news verifiers, respectively, as surmised by . The purpose of the reputation lists is to identify insidious agents and ignore any further communication originating from them.
- , , is the index of .
- is the verification outcome that has sent to .
- is the proof sequence that has sent to .
- is the verification outcome that claims he received from .
- is the proof sequence that claims he received from .
Algorithm 1: QNVA |
|
5. Discussion and Conclusions
- Generality: It can handle any number of news aggregators and verifiers.
- Efficiency: The algorithm completes in a constant number of steps, regardless of the participant count.
- Simplicity: It relies solely on EPR (specifically ) pairs. EPR pairs are the easiest maximally entangled states to produce, unlike more complex states such as and , which do not scale so easily as the number of players increases.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Campan, A.; Cuzzocrea, A.; Truta, T.M. Fighting fake news spread in online social networks: Actual trends and future research directions. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar] [CrossRef]
- Zhou, X.; Zafarani, R.; Shu, K.; Liu, H. Fake News: Fundamental Theories, Detection Strategies and Challenges. In Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, WSDM ’19, Melbourne, VIC, Australia, 11–15 February 2019; ACM: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
- Vorhies, W. Using Algorithms to Detect Fake News—The State of the Art—DataScienceCentral.com. 2017. Available online: https://www.datasciencecentral.com/using-algorithms-to-detect-fake-news-the-state-of-the-art/ (accessed on 14 January 2024).
- Shu, K.; Sliva, A.; Wang, S.; Tang, J.; Liu, H. Fake News Detection on Social Media: A Data Mining Perspective. ACM SIGKDD Explor. Newsl. 2017, 19, 22–36. [Google Scholar] [CrossRef]
- Rashkin, H.; Choi, E.; Jang, J.Y.; Volkova, S.; Choi, Y. Truth of Varying Shades: Analyzing Language in Fake News and Political Fact-Checking. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, Copenhagen, Denmark, 7–11 September 2017; Association for Computational Linguistics: Cambridge, MA, USA, 2017. [Google Scholar] [CrossRef]
- Mustafaraj, E.; Metaxas, P.T. The Fake News Spreading Plague: Was it Preventable? arXiv 2017. [Google Scholar] [CrossRef]
- Gilda, S. Notice of Violation of IEEE Publication Principles: Evaluating machine learning algorithms for fake news detection. In Proceedings of the 2017 IEEE 15th Student Conference on Research and Development (SCOReD), Putrajaya, Malaysia, 13–14 December 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar] [CrossRef]
- Farajtabar, M.; Yang, J.; Ye, X.; Xu, H.; Trivedi, R.; Khalil, E.; Li, S.; Song, L.; Zha, H. Fake News Mitigation via Point Process Based Intervention. In Proceedings of the 34th International Conference on Machine Learning, PMLR 2017, Sydney, Australia, 6–11 August 2017; Precup, D., Teh, Y.W., Eds.; Volume 70, pp. 1097–1106. [Google Scholar]
- Agudelo, G.E.R.; Parra, O.J.S.; Velandia, J.B. Raising a Model for Fake News Detection Using Machine Learning in Python. In Challenges and Opportunities in the Digital Era; Springer International Publishing: Cham, Switzerland, 2018; pp. 596–604. [Google Scholar] [CrossRef]
- Kesarwani, A.; Chauhan, S.S.; Nair, A.R.; Verma, G. Supervised Machine Learning Algorithms for Fake News Detection. In Advances in Communication and Computational Technology; Springer Nature: Singapore, 2020; pp. 767–778. [Google Scholar] [CrossRef]
- Kesarwani, A.; Chauhan, S.S.; Nair, A.R. Fake News Detection on Social Media using K-Nearest Neighbor Classifier. In Proceedings of the 2020 International Conference on Advances in Computing and Communication Engineering (ICACCE), Las Vegas, NV, USA, 22–24 June 2020; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar] [CrossRef]
- Ozbay, F.A.; Alatas, B. Fake news detection within online social media using supervised artificial intelligence algorithms. Physica A Stat. Mech. Its Appl. 2020, 540, 123174. [Google Scholar] [CrossRef]
- Vijayaraghavan, S.; Wang, Y.; Guo, Z.; Voong, J.; Xu, W.; Nasseri, A.; Cai, J.; Li, L.; Vuong, K.; Wadhwa, E. Fake News Detection with Different Models. arXiv 2003. [Google Scholar] [CrossRef]
- Choudhary, P.; Pandey, S.; Tripathi, S.; Chaurasiya, S. Fake News Detection Based on Machine Learning. In Advances in Smart Communication and Imaging Systems; Lecture Notes in Electrical Engineering; Springer: Singapore, 2021; pp. 67–75. [Google Scholar] [CrossRef]
- Nagashri, K.; Sangeetha, J. Fake News Detection Using Passive-Aggressive Classifier and Other Machine Learning Algorithms. In Advances in Computing and Network Communications; Springer: Singapore, 2021; pp. 221–233. [Google Scholar] [CrossRef]
- Pandey, S.; Prabhakaran, S.; Subba Reddy, N.V.; Acharya, D. Fake News Detection from Online media using Machine learning Classifiers. J. Phys. Conf. Ser. 2022, 2161, 012027. [Google Scholar] [CrossRef]
- Tee, W.J.; Murugesan, R.K. Trust Network, Blockchain and Evolution in Social Media to Build Trust and Prevent Fake News. In Proceedings of the 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA), Subang Jaya, Malaysia, 26–28 October 2018; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar] [CrossRef]
- Chow, J.; Dial, O.; Gambetta, J. IBM Quantum Breaks the 100-Qubit Processor Barrier. 2021. Available online: https://www.ibm.com/quantum/blog/127-qubit-quantum-processor-eagle (accessed on 2 March 2024).
- Newsroom, I. IBM Unveils 400 Qubit-Plus Quantum Processor. 2022. Available online: https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two (accessed on 2 March 2024).
- Gambetta, J. The Hardware and Software for the Era of Quantum Utility Is Here. 2023. Available online: https://www.ibm.com/quantum/blog/quantum-roadmap-2033 (accessed on 2 March 2024).
- Alfieri, A.; Anantharaman, S.B.; Zhang, H.; Jariwala, D. Nanomaterials for Quantum Information Science and Engineering. Adv. Mater. 2023, 35, 2109621. [Google Scholar] [CrossRef]
- Kagan, C.R.; Bassett, L.C.; Murray, C.B.; Thompson, S.M. Colloidal Quantum Dots as Platforms for Quantum Information Science. Chem. Rev. 2021, 121, 3186–3233. [Google Scholar] [CrossRef]
- Rozenman, G.G.; Kundu, N.K.; Liu, R.; Zhang, L.; Maslennikov, A.; Reches, Y.; Youm, H.Y. The quantum internet: A synergy of quantum information technologies and 6G networks. IET Quantum Commun. 2023, 4, 147–166. [Google Scholar] [CrossRef]
- Feinberg, A.J.; Verma, D.; O’Connell-Lopez, S.M.; Erukala, S.; Tanyag, R.M.P.; Pang, W.; Saladrigas, C.A.; Toulson, B.W.; Borgwardt, M.; Shivaram, N.; et al. Aggregation of solutes in bosonic versus fermionic quantum fluids. Sci. Adv. 2021, 7, eabk2247. [Google Scholar] [CrossRef]
- EPFL; Quantum Integrity. Quantum Integrity and EPFL develop Deep Fake Detector. 2019. Available online: https://www.startupticker.ch/en/news/september-2019/quantum-integrity-and-epfl-develop-deep-fake-detector (accessed on 14 January 2024).
- Kamal, S.; Chahar, V.; Sharma, S. Quantum Machine Learning-based Detection of Fake News and Deep Fake Videos; IEEE Technology Policy and Ethics. 2022. Available online: https://cmte.ieee.org/futuredirections/tech-policy-ethics/july-2022/quantum-machine-learning-based-detection-of-fake-news-and-deep-fake-videos (accessed on 2 March 2024).
- Tian, Z.; Baskiyar, S. Fake News Detection: An Application of Quantum K-Nearest Neighbors. In Proceedings of the 2021 IEEE Symposium Series on Computational Intelligence (SSCI), Orlando, FL, USA, 5–7 December 2021; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar] [CrossRef]
- Google. Announcing TensorFlow Quantum: An Open Source Library for Quantum Machine Learning—blog.research.google. 2020. Available online: https://blog.research.google/2020/03/announcing-tensorflow-quantum-open.html (accessed on 14 January 2024).
- Andronikos, T.; Sirokofskich, A. A Quantum Detectable Byzantine Agreement Protocol Using Only EPR Pairs. Appl. Sci. 2023, 13, 8405. [Google Scholar] [CrossRef]
- Meyer, D.A. Quantum strategies. Phys. Rev. Lett. 1999, 82, 1052–1055. [Google Scholar] [CrossRef]
- Eisert, J.; Wilkens, M.; Lewenstein, M. Quantum games and quantum strategies. Phys. Rev. Lett. 1999, 83, 3077–3080. [Google Scholar] [CrossRef]
- Rycerz, K.; Frackiewicz, P. A quantum approach to twice-repeated 2 × 2 game. Quantum Inf. Process. 2020, 19, 269. [Google Scholar] [CrossRef]
- Altintas, A.A.; Ozaydin, F.; Bayindir, C.; Bayrakci, V. Prisoners’ Dilemma in a Spatially Separated System Based on Spin–Photon Interactions. Photonics 2022, 9, 617. [Google Scholar] [CrossRef]
- Anand, N.; Benjamin, C. Do quantum strategies always win? Quantum Inf. Process. 2015, 14, 4027–4038. [Google Scholar] [CrossRef]
- Andronikos, T.; Sirokofskich, A. The Connection between the PQ Penny Flip Game and the Dihedral Groups. Mathematics 2021, 9, 1115. [Google Scholar] [CrossRef]
- Andronikos, T. Conditions that enable a player to surely win in sequential quantum games. Quantum Inf. Process. 2022, 21, 268. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
- Andronikos, T.; Stefanidakis, M. A Two-Party Quantum Parliament. Algorithms 2022, 15, 62. [Google Scholar] [CrossRef]
- Cruz, D.; Fournier, R.; Gremion, F.; Jeannerot, A.; Komagata, K.; Tosic, T.; Thiesbrummel, J.; Chan, C.L.; Macris, N.; Dupertuis, M.A.; et al. Efficient Quantum Algorithms for GHZ and W States, and Implementation on the IBM Quantum Computer. Adv. Quantum Technol. 2019, 2, 1900015. [Google Scholar] [CrossRef]
- Bell, J.S. On the Einstein Podolsky Rosen paradox. Phys. Phys. Fiz. 1964, 1, 195–200. [Google Scholar] [CrossRef]
- Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
- Neigovzen, R.; Rodó, C.; Adesso, G.; Sanpera, A. Multipartite continuous-variable solution for the Byzantine agreement problem. Phys. Rev. A 2008, 77, 062307. [Google Scholar] [CrossRef]
- Feng, Y.; Shi, R.; Zhou, J.; Liao, Q.; Guo, Y. Quantum Byzantine Agreement with Tripartite Entangled States. Int. J. Theor. Phys. 2019, 58, 1482–1498. [Google Scholar] [CrossRef]
- Wang, W.; Yu, Y.; Du, L. Quantum blockchain based on asymmetric quantum encryption and a stake vote consensus algorithm. Sci. Rep. 2022, 12, 8606. [Google Scholar] [CrossRef]
- Yang, Z.; Salman, T.; Jain, R.; Pietro, R.D. Decentralization Using Quantum Blockchain: A Theoretical Analysis. IEEE Trans. Quantum Eng. 2022, 3, 4100716. [Google Scholar] [CrossRef]
- Qu, Z.; Zhang, Z.; Liu, B.; Tiwari, P.; Ning, X.; Muhammad, K. Quantum detectable Byzantine agreement for distributed data trust management in blockchain. Inf. Sci. 2023, 637, 118909. [Google Scholar] [CrossRef]
- Ikeda, K.; Lowe, A. Quantum protocol for decision making and verifying truthfulness among N-quantum parties: Solution and extension of the quantum coin flipping game. IET Quantum Commun. 2023, 4, 218–227. [Google Scholar] [CrossRef]
How the Degree of Accuracy d Affects the Probability P | |||
---|---|---|---|
d | |||
4 | 2 | 1 | 5.000E−1 |
8 | 4 | 2 | 1.667E−1 |
16 | 8 | 4 | 1.429E−2 |
32 | 16 | 10 | 7.770E−5 |
64 | 21 | 16 | 1.664E−9 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Andronikos, T.; Sirokofskich, A. A Quantum Approach to News Verification from the Perspective of a News Aggregator. Information 2024, 15, 207. https://doi.org/10.3390/info15040207
Andronikos T, Sirokofskich A. A Quantum Approach to News Verification from the Perspective of a News Aggregator. Information. 2024; 15(4):207. https://doi.org/10.3390/info15040207
Chicago/Turabian StyleAndronikos, Theodore, and Alla Sirokofskich. 2024. "A Quantum Approach to News Verification from the Perspective of a News Aggregator" Information 15, no. 4: 207. https://doi.org/10.3390/info15040207
APA StyleAndronikos, T., & Sirokofskich, A. (2024). A Quantum Approach to News Verification from the Perspective of a News Aggregator. Information, 15(4), 207. https://doi.org/10.3390/info15040207