One-to-Many Simultaneous Secure Quantum Information Transmission
Abstract
:1. Introduction
1.1. Contribution
1.2. Organization
2. Background and Terminology
- stands for .
- We follow the typical convention of writing bit vectors in boldface. A bit vector of length m is simply a sequence of m bits: . In this fashion, the zero-bit vector is designated by .
- The notation means that the bit vector ranges through all the bit vector representations of the basis kets.
- To avoid any possible confusion, we use again the i indices, , to make it clear that denotes the state of the ith quantum register.
3. The One-to-Many Simultaneous Secure Quantum Information Transmission Protocol
- Alice controls a network of agents: Agent, …, Agent. Alice and all her agents reside at different geographical locations.
- Alice must transmit to each of her agents a personalized information bit vector .
- Time is of the essence, so to speed things up, Alice wants the information transmission to her agents to take place simultaneously, in one go.
- Given the personalized information bit vectors , Alice constructs aggregated information bit vector as their concatenation.
- Most importantly, the communication must be information-theoretically secure, so that her adversary, the eavesdropper, Eve, cannot obtain any secret information.
- Theoretically, the number (n) of players is totally arbitrary, i.e., it may be any large integer. The only conceivable limitation could be the ability of our currently available apparatus to generate tuples when n goes beyond a certain limit.
- Alice assigns a specific ordering to her network of agents. The position, , of each agent in this ordering is common knowledge, that is, Alice and all her agents know who Agent, …, Agent are.
- In general, the personalized information bit vectors are assumed to be of different lengths. Obviously, our protocol can easily handle the special case where the information bit vectors have a fixed length.
- Alice communicates via the classical channel to all of her agents the length of the aggregated information bit vector and the lengths () of the personalized bit vectors. This does not compromise secrecy, because knowing the length of a secret vector does not reveal its contents. We use the symbolism to designate the length, i.e., number of bits, of the enclosed bit vector.
3.1. Entanglement Distribution and Validation Stage
- (EDV1)
- Alice prepares a sequence of m tuples, that is, qubits, called the information sequence, which is used for the actual transmission of the aggregated information bit vector.
- (EDV2)
- Additionally, Alice prepares the decoy sequence, consisting of d nonentangled n-tuples, called decoy tuples, which is used during the first stage of the protocol for the validation test. In a decoy tuple, each qubit is prepared in a state that is chosen randomly and with equal probability from the states . It is important to emphasize that each qubit of the decoy tuple is prepared independently of the other qubits of the same tuple. Altogether, decoy qubits are prepared in the Hadamard basis.
- (EDV3)
- Assuming that in each n-tuple the qubits are numbered from 0 (the least significant) to (the most significant), Alice performs the following:
- ⋄
- Storing, in her input register, denoted by in Figure 3, the th qubit of each of the in total n-tuples
- ⋄
- Sending to Agent the ith qubit, , of each of the tuples through the quantum channel. These qubits populate Agent’s input register, designated by in Figure 3. Overall, Alice prepares qubits and transmits qubits to her agents, out of which are information carriers and are decoys.
- (EDV4)
- It is of critical importance that Alice inserts the decoy sequence randomly and uniformly within the information sequence, using an appropriate probability distribution. Obviously, Alice must keep track of the positions of decoy tuples. Moreover, for each decoy tuple, Alice must record the states of all of its qubits.
- (EDV5)
- After the distribution of the tuples has been completed, Alice proceeds to conducting the validation test, which is analyzed in detail in Section 4. During this test, the d decoy tuples are measured and consumed. If the outcome of the test is deemed a success, Alice knows that her adversary, Eve, did not manage to tamper with the distribution of the entangled qubits. Thus, the protocol can safely proceed to the next stage, in which only the m tuples are used. If the outcome of the test is considered a failure, the execution of the protocol is aborted.
3.2. Secret Embedding Stage
3.3. Decryption Stage
- (EV1)
- Alice sends to every Agent, , the ith segment () of her input register.
- (EV2)
- Agent, , sends to every other Agent, , the jth segment () of their input register.
- No agent sends any information to Alice.
- Agent keeps to themselves the ith segment of their input register. Ergo, Eve, despite her knowing segments and , , which are transmitted via the classical channel, lacks the crucial ingredient, , and is thus unable to obtain information bit vector .
4. Security Analysis
- (VT1)
- Alice communicates to every one of her agents (Agent, …, Agent) the positions of the decoys, so that they can measure them in the Hadamard basis.
- (VT2)
- Each agents sends back to Alice the results of their measurements. It is important to realize that the expected measurement outcome is, in general, different for every agent, because according to (EDV), each qubit of the decoy tuple is prepared independently from the other qubits of the same tuple.
- (VT3)
- Alice analyzes the results received from her agents and decides whether the test is successful or not according to the following rationale:
- ⋄
- If 0 or very few wrong measurement outcomes are found, then Alice considers the validation test successful.
- ⋄
- If the number of errors is ≈ or above a similar threshold, then Alice deems that validation test a failure, in which case she aborts and terminates the protocol.
- (EA1)
- Measure and resend. Eve intercepts one or more qubits from each n-tuple during their transmission from Alice to her agents. After measuring the intercepted qubit(s), Eve sends them back to their intended recipient. We make the following observations:
- ⋄
- With the act of measurement, Eve destroys the entanglement. In view of the fact that in order to embed an aggregated information bit vector into the global state of the distributed circuit, entanglement is absolutely necessary, the protocol fails. Hence, it is imperative that Alice discovers the loss of entanglement and aborts the execution of the protocol.
- ⋄
- First, we examine the scenario where Eve always uses the computational basis for her measurements. In this scenario, the probability that Eve measures one decoy qubit and obtains the wrong outcome is , since all the decoys are measured in the wrong basis, and the probability to obtain the wrong outcome in such a case is . Consequently, the probability that Eve obtains the correct outcome is . This last probability implies that if Eve measures a second qubit from the same tuple, the probability to obtain two correct outcomes is way smaller. So, if Eve intercepts and measures two or more qubits from the same tuple, she stands to gain nothing in case they belong to a tuple, while she risks increasing the number of errors each time they belong to a decoy tuple. Therefore, Eve, being rational, only measures one qubit from each tuple.
- ⋄
- Now, we consider the scenario where Eve randomly chooses the measurement basis between the computational or the Hadamard basis with equal probability. In this situation, the probability that Eve measures one decoy qubit and obtains the wrong outcome is given as , since the probability that a decoy is measured in the wrong basis is and, even then, the probability to obtain the wrong outcome is . Consequently, the probability that Eve obtains the correct outcome is . For the same reasons that we explained above, Eve only measures one qubit from each tuple.
- (EA2)
- Intercept and send fake n-tuples. Eve intercepts a number of qubits from every n-tuple during their transmission from Alice to her agents. This number may range from just 1 to . Eve cannot clone the intercepted qubits due to the no-cloning theorem, but it is conceivable that she has prepared her own tuples. This opens up the possibility that she keeps the intercepted qubits and forwards her own in their place. Again, we make the following remarks:
- ⋄
- By doing so, Eve tampers with the entanglement. The protocol fails because at least one information bit vector is not encoded into the entanglement. Again, it is crucial that Alice discovers the loss of entanglement and aborts the execution of the protocol.
- ⋄
- Eve, even if she were successful, would fail to gain any information. This is because her qubits are not entangled with Alice’s qubits. The latter is the unique source of information who embeds the individual information bit vectors in those registers that are entangled with her own.
- ⋄
- The flaw in this scenario is once again that Eve has no way of knowing the position of the decoys. If Eve intercepts just one qubit from every tuple, she inadvertently replaces d decoy qubits with her qubits. When, during the validation test, these are measured in the Hadamard basis, the probability to obtain the wrong outcome is . This produces approximately ≈ errors, which can be easily noticed by Alice. If Eve intercepts k qubits from each tuple, the probability to obtain at least one wrong measurement in a decoy tuple is , which results in approximately ≈ errors. In addition to the increased number of errors, Alice can easily notice that for k decoy qubits in every decoy tuple, the measurement results from her agents are identical, instead of uniformly distributed as they should be, as ordained by (EDV). Practically, this strategy has almost zero chances of success, since Alice undoubtedly infers the presence of Eve.
- (EA3)
- Entangle with ancilla qubits and measure later. Eve intercepts one qubit from every n-tuple during their transmission from Alice to her agents. Now, instead of measuring or replacing the intercepted qubits, Eve entangles them with her ancilla qubits and then forwards them to their intended recipient. Eve plans to wait until the protocol is completed before measuring her qubits, hoping to gain useful information. In this case, we stress the following points:
- ⋄
- The result of Eve’s actions is that, instead of having m tuples distributed among Alice and her agents, we end up with m tuples evenly distributed among Alice, her agents, and Eve. Eve, even if she were successful, would fail to gain any information. This is because in order to decipher even a single information vector, she would require the contents of Alice and her agents’ registers.
- ⋄
- Of course, by doing so, Eve changes the entanglement. The protocol fails for the same reason as above, i.e., to decipher even a single information vector, Alice and her agents require the contents of Eve’s register. Again, it is imperative that Alice discovers the loss of entanglement and aborts the execution of the protocol.
- ⋄
- Like in all previous cases, the decoys enable Alice to infer the presence of Eve. Recall that Eve has no way of knowing the position of the decoys. If Eve intercepts just one qubit from every tuple, she entangles d decoy qubits with her ancilla qubits. When, during the validation test, these are measured in the Hadamard basis, the probability to obtain the wrong outcome is . This produces approximately ≈ errors, which can be easily noticed by Alice. If Eve intercepts k qubits from each tuple, the probability to obtain at least one wrong measurement in a decoy tuple is , which results in approximately ≈ errors. In addition to the increased number of errors, Alice easily notices that for k decoy qubits in every decoy tuple, the measurement results from her agents are identical, instead of uniformly distributed as they should be, as ordained by (EDV). This policy too has practically zero chances of success.
5. Discussion and Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Shor, P. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; IEEE Computer Society Press: Washington, DC, USA, 1994. [Google Scholar] [CrossRef]
- Grover, L. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996. [Google Scholar] [CrossRef]
- Chow, J.; Dial, O.; Gambetta, J. IBM Quantum Breaks the 100-Qubit Processor Barrier. 2021. Available online: https://research.ibm.com/blog/127-qubit-quantum-processor-eagle (accessed on 3 April 2022).
- IBM Newsroom. IBM Unveils 400 Qubit-Plus Quantum Processor. 2022. Available online: https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two (accessed on 3 April 2022).
- Gambetta, J. The Hardware and Software for the Era of Quantum Utility Is Here. 2023. Available online: https://www.ibm.com/quantum/blog/quantum-roadmap-2033 (accessed on 6 December 2023).
- Chen, L.; Chen, L.; Jordan, S.; Liu, Y.K.; Moody, D.; Peralta, R.; Perlner, R.; Smith-Tone, D. Report on Post-Quantum Cryptography; US Department of Commerce: Washington, DC, USA; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016; Volume 12.
- Alagic, G.; Alagic, G.; Alperin-Sheriff, J.; Apon, D.; Cooper, D.; Dang, Q.; Liu, Y.K.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process; US Department of Commerce: Washington, DC, USA; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019.
- Alagic, G.; Alperin-Sheriff, J.; Apon, D.; Cooper, D.; Dang, Q.; Kelsey, J.; Liu, Y.K.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process; US Department of Commerce: Washington, DC, USA; NIST: Gaithersburg, MD, USA, 2020.
- Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022.
- Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed]
- Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 1992, 68, 557–559. [Google Scholar] [CrossRef] [PubMed]
- Gisin, N.; Ribordy, G.; Zbinden, H.; Stucki, D.; Brunner, N.; Scarani, V. Towards practical and fast quantum cryptography. arXiv 2004, arXiv:quant-ph/0411022. [Google Scholar]
- Inoue, K.; Waks, E.; Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 2002, 89, 037902. [Google Scholar] [CrossRef] [PubMed]
- Guan, J.Y.; Cao, Z.; Liu, Y.; Shen-Tu, G.L.; Pelc, J.S.; Fejer, M.; Peng, C.Z.; Ma, X.; Zhang, Q.; Pan, J.W. Experimental passive round-robin differential phase-shift quantum key distribution. Phys. Rev. Lett. 2015, 114, 180502. [Google Scholar] [CrossRef]
- Waks, E.; Takesue, H.; Yamamoto, Y. Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 2006, 73, 012344. [Google Scholar] [CrossRef]
- Ampatzis, M.; Andronikos, T. QKD Based on Symmetric Entangled Bernstein-Vazirani. Entropy 2021, 23, 870. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 12 December 1984; IEEE Computer Society Press: Washington, DC, USA, 1984; pp. 175–179. [Google Scholar]
- Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef]
- Ampatzis, M.; Andronikos, T. A Symmetric Extensible Protocol for Quantum Secret Sharing. Symmetry 2022, 14, 1692. [Google Scholar] [CrossRef]
- Ampatzis, M.; Andronikos, T. Quantum Secret Aggregation Utilizing a Network of Agents. Cryptography 2023, 7, 5. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70, 1895–1899. [Google Scholar] [CrossRef] [PubMed]
- Attasena, V.; Darmont, J.; Harbi, N. Secret sharing for cloud data security: A survey. VLDB J. 2017, 26, 657–681. [Google Scholar] [CrossRef]
- Ermakova, T.; Fabian, B. Secret sharing for health data in multi-provider clouds. In Proceedings of the 2013 IEEE 15th Conference on Business Informatics, Vienna, Austria, 15–18 July 2013; pp. 93–100. [Google Scholar]
- Cha, J.; Singh, S.K.; Kim, T.W.; Park, J.H. Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 2021, 57, 102686. [Google Scholar] [CrossRef]
- Sun, X.; Kulicki, P.; Sopek, M. Multi-Party Quantum Byzantine Agreement without Entanglement. Entropy 2020, 22, 1152. [Google Scholar] [CrossRef] [PubMed]
- Qu, Z.; Zhang, Z.; Liu, B.; Tiwari, P.; Ning, X.; Muhammad, K. Quantum detectable Byzantine agreement for distributed data trust management in blockchain. Inf. Sci. 2023, 637, 118909. [Google Scholar] [CrossRef]
- Zhang, M.; Huang, P.; Wang, P.; Wei, S.; Zeng, G. Experimental free-space continuous-variable quantum key distribution with thermal source. Opt. Lett. 2023, 48, 1184. [Google Scholar] [CrossRef]
- Huang, P.; Wang, T.; Chen, R.; Wang, P.; Zhou, Y.; Zeng, G. Experimental continuous-variable quantum key distribution using a thermal source. New J. Phys. 2021, 23, 113028. [Google Scholar] [CrossRef]
- Portmann, C.; Renner, R. Security in quantum cryptography. Rev. Mod. Phys. 2022, 94, 025008. [Google Scholar] [CrossRef]
- Li, C.L.; Fu, Y.; Liu, W.B.; Xie, Y.M.; Li, B.H.; Zhou, M.G.; Yin, H.L.; Chen, Z.B. Breaking universal limitations on quantum conference key agreement without quantum memory. Commun. Phys. 2023, 6, 122. [Google Scholar] [CrossRef]
- Das, S.; Bäuml, S.; Winczewski, M.; Horodecki, K. Universal Limitations on Quantum Key Distribution over a Network. Phys. Rev. X 2021, 11, 041016. [Google Scholar] [CrossRef]
- Wei, K.J.; Ma, H.Q.; Yang, J.H. Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 2013, 21, 16663. [Google Scholar] [CrossRef] [PubMed]
- Li, C.L.; Fu, Y.; Liu, W.B.; Xie, Y.M.; Li, B.H.; Zhou, M.G.; Yin, H.L.; Chen, Z.B. Breaking the rate-distance limitation of measurement-device-independent quantum secret sharing. Phys. Rev. Res. 2023, 5, 033077. [Google Scholar] [CrossRef]
- Long, G.L.; Liu, X.S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 2002, 65, 032302. [Google Scholar] [CrossRef]
- Pan, D.; Song, X.T.; Long, G.L. Free-Space Quantum Secure Direct Communication: Basics, Progress, and Outlook. Adv. Devices Instrum. 2023, 4, 4. [Google Scholar] [CrossRef]
- Beige, A.; Englert, B.; Kurtsiefer, C.; Weinfurter, H. Secure Communication with a Publicly Known Key. Acta Phys. Pol. A 2002, 101, 357–368. [Google Scholar] [CrossRef]
- Boström, K.; Felbinger, T. Deterministic Secure Direct Communication Using Entanglement. Phys. Rev. Lett. 2002, 89, 187902. [Google Scholar] [CrossRef] [PubMed]
- Nguyen, B.A. Quantum dialogue. Phys. Lett. A 2004, 328, 6–10. [Google Scholar] [CrossRef]
- Zhang, J.W.; Xu, G.; Chen, X.B.; Chang, Y.; Dong, Z.C. Improved multiparty quantum private comparison based on quantum homomorphic encryption. Phys. A Stat. Mech. Its Appl. 2023, 610, 128397. [Google Scholar] [CrossRef]
- Meyer, D.A. Quantum strategies. Phys. Rev. Lett. 1999, 82, 1052. [Google Scholar] [CrossRef]
- Eisert, J.; Wilkens, M.; Lewenstein, M. Quantum games and quantum strategies. Phys. Rev. Lett. 1999, 83, 3077. [Google Scholar] [CrossRef]
- Andronikos, T.; Sirokofskich, A.; Kastampolidou, K.; Varvouzou, M.; Giannakis, K.; Singh, A. Finite Automata Capturing Winning Sequences for All Possible Variants of the PQ Penny Flip Game. Mathematics 2018, 6, 20. [Google Scholar] [CrossRef]
- Andronikos, T.; Sirokofskich, A. The Connection between the PQ Penny Flip Game and the Dihedral Groups. Mathematics 2021, 9, 1115. [Google Scholar] [CrossRef]
- Andronikos, T. Conditions that enable a player to surely win in sequential quantum games. Quantum Inf. Process. 2022, 21, 268. [Google Scholar] [CrossRef]
- Andronikos, T.; Stefanidakis, M. A Two-Party Quantum Parliament. Algorithms 2022, 15, 62. [Google Scholar] [CrossRef]
- Wolf, R. Quantum Key Distribution; Springer International Publishing: Berlin/Heidelberg, Germany, 2021. [Google Scholar] [CrossRef]
- Renner, R.; Wolf, R. Quantum Advantage in Cryptography. AIAA J. 2023, 61, 1895–1910. [Google Scholar] [CrossRef]
- Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
- Yanofsky, N.S.; Mannucci, M.A. Quantum Computing for Computer Scientists; Cambridge University Press: Cambridge, UK, 2013. [Google Scholar]
- Wong, T.G. Introduction to Classical and Quantum Computing; Rooted Grove: Omaha, Nebraska, 2022. [Google Scholar]
- Cruz, D.; Fournier, R.; Gremion, F.; Jeannerot, A.; Komagata, K.; Tosic, T.; Thiesbrummel, J.; Chan, C.L.; Macris, N.; Dupertuis, M.A.; et al. Efficient Quantum Algorithms for GHZ and W States, and Implementation on the IBM Quantum Computer. Adv. Quantum Technol. 2019, 2, 1900015. [Google Scholar] [CrossRef]
- Mermin, N. Quantum Computer Science: An Introduction; Cambridge University Press: Cambridge, UK, 2007. [Google Scholar] [CrossRef]
- Qiskit. Qiskit Open-Source Quantum Development. Available online: https://qiskit.org (accessed on 3 April 2022).
- Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
- Sukeno, H.; Wei, T.C.; Hillery, M.; Bergou, J.A.; Fields, D.; Malinovsky, V.S. Broadcasting single-qubit and multiqubit entangled states: Authentication, cryptography, and distributed quantum computation. Phys. Rev. A 2023, 107, 062605. [Google Scholar] [CrossRef]
- Ikeda, K.; Lowe, A. Quantum interactive proofs using quantum energy teleportation. arXiv 2023, arXiv:2306.08242. [Google Scholar]
- Ikeda, K. Demonstration of Quantum Energy Teleportation on Superconducting Quantum Hardware. Phys. Rev. Appl. 2023, 20, 024051. [Google Scholar] [CrossRef]
- Ikeda, K. Long-range quantum energy teleportation and distribution on a hyperbolic quantum network. arXiv 2023, arXiv:2301.11884. [Google Scholar]
- Andronikos, T.; Sirokofskich, A. An Entanglement-Based Protocol for Simultaneous Reciprocal Information Exchange between 2 Players. Electronics 2023, 12, 2506. [Google Scholar] [CrossRef]
- Coffman, V.; Kundu, J.; Wootters, W.K. Distributed entanglement. Phys. Rev. A 2000, 61, 052306. [Google Scholar] [CrossRef]
- Brunner, N.; Cavalcanti, D.; Pironio, S.; Scarani, V.; Wehner, S. Bell nonlocality. Rev. Mod. Phys. 2014, 86, 419. [Google Scholar] [CrossRef]
- Fitzi, M.; Gisin, N.; Maurer, U. Quantum Solution to the Byzantine Agreement Problem. Phys. Rev. Lett. 2001, 87, 217901. [Google Scholar] [CrossRef] [PubMed]
- Cabello, A. Solving the liar detection problem using the four-qubit singlet state. Phys. Rev. A 2003, 68, 012304. [Google Scholar] [CrossRef]
- Neigovzen, R.; Rodó, C.; Adesso, G.; Sanpera, A. Multipartite continuous-variable solution for the Byzantine agreement problem. Phys. Rev. A 2008, 77, 062307. [Google Scholar] [CrossRef]
- Feng, Y.; Shi, R.; Zhou, J.; Liao, Q.; Guo, Y. Quantum Byzantine Agreement with Tripartite Entangled States. Int. J. Theor. Phys. 2019, 58, 1482–1498. [Google Scholar] [CrossRef]
- Ikeda, K. Security and Privacy of Blockchain and Quantum Computation. In Blockchain Technology: Platforms, Tools and Use Cases; Elsevier: Amsterdam, The Netherlands, 2018; pp. 199–228. [Google Scholar] [CrossRef]
- Ikeda, K. qBitcoin: A Peer-to-Peer Quantum Cash System. In Intelligent Computing; Springer International Publishing: Berlin/Heidelberg, Germany, 2018; pp. 763–771. [Google Scholar] [CrossRef]
- Wang, W.; Yu, Y.; Du, L. Quantum blockchain based on asymmetric quantum encryption and a stake vote consensus algorithm. Sci. Rep. 2022, 12, 4100716. [Google Scholar] [CrossRef]
- Yang, Z.; Salman, T.; Jain, R.; Pietro, R.D. Decentralization Using Quantum Blockchain: A Theoretical Analysis. IEEE Trans. Quantum Eng. 2022, 3, 8606. [Google Scholar] [CrossRef]
- Ikeda, K.; Lowe, A. Quantum protocol for decision making and verifying truthfulness among N-quantum parties: Solution and extension of the quantum coin flipping game. IET Quantum Commun. 2023, 4, 218–227. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Andronikos, T.; Sirokofskich, A. One-to-Many Simultaneous Secure Quantum Information Transmission. Cryptography 2023, 7, 64. https://doi.org/10.3390/cryptography7040064
Andronikos T, Sirokofskich A. One-to-Many Simultaneous Secure Quantum Information Transmission. Cryptography. 2023; 7(4):64. https://doi.org/10.3390/cryptography7040064
Chicago/Turabian StyleAndronikos, Theodore, and Alla Sirokofskich. 2023. "One-to-Many Simultaneous Secure Quantum Information Transmission" Cryptography 7, no. 4: 64. https://doi.org/10.3390/cryptography7040064
APA StyleAndronikos, T., & Sirokofskich, A. (2023). One-to-Many Simultaneous Secure Quantum Information Transmission. Cryptography, 7(4), 64. https://doi.org/10.3390/cryptography7040064