Next Article in Journal
Generalized Weyl–Heisenberg Algebra, Qudit Systems and Entanglement Measure of Symmetric States via Spin Coherent States
Next Article in Special Issue
Enhancing the Generated Stable Correlation in a Dissipative System of Two Coupled Qubits inside a Coherent Cavity via Their Dipole-Dipole Interplay
Previous Article in Journal
Optimization of CNN through Novel Training Strategy for Visual Classification Problems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

1
School of Cyber Science and Technology, Beihang University, Beijing 100083, China
2
School of Electronic and Information Engineering, Beihang University, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Submission received: 22 March 2018 / Revised: 15 April 2018 / Accepted: 16 April 2018 / Published: 17 April 2018
(This article belongs to the Collection Quantum Information)

Abstract

:
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.

1. Introduction

Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. In virtue of no-cloning theorem and uncertainty principle, an attacker can neither distinguish between two non-orthogonal quantum states nor copy an unknown quantum state. Many quantum cryptographic protocols have been proposed based on this feature of quantum states and have been proved secure in both theoretical and experimental ways.
According to the fact that a quantum system has either a discrete spectrum or a continuous spectrum, quantum information can be classified into two categories, namely discrete variables and continuous variables. Discrete-variable quantum cryptographic protocols are more widely studied but are more expensive than continuous-variable ones. Continuous-variable quantum cryptography has gained much attention for practical advantages of low cost, high efficiency and compatibility with current optical fiber communication systems. Since continuous-variable quantum cryptographic protocols are very probable to be implemented in practice, such analysis which assumes all devices are perfect is insufficient to judge whether a protocol is truly secure or not. An attacker could exploit the loopholes of a device to successfully attack a protocol even though it is proved theoretically secure. To analyze the practical security of a quantum cryptographic protocol, the definition of device independency was proposed. If a protocol can complete its task securely, even if all devices are untrusted, which means some devices might be controlled by an attacker, it is called a device-independent (DI) protocol.
To date, research on device independency analysis only focuses on quantum key distribution (QKD) protocols. In 2006, Acin et al. [1] proposed the first device-independent quantum key distribution (DI-QKD) protocol and proved its security against individual attacks. Before long security analyses against collective attacks of DI-QKD protocols were proposed [2,3]. Since 2011, general formalisms for proving the security of DI-QKD protocols have been proposed [4,5], which can defend against the most general attacks. However, these analyses were proposed for discrete-variable QKD protocols, which means they cannot be directly applied to continuous-variable quantum cryptographic protocols.
As we know, in the continuous-variable setting, research focuses more on the measurement-device independency of a protocol rather than device independency, which only considers the independency of measurement devices. Measurement devices are the devices used for measuring quantum observables, such as beam splitter (BS) and homodyne detector. The concept of measurement-device independency was put forward by Lo et al. [6] in 2012. It can be regarded as a weakened version of device independency because it only considers the security loopholes of measurement devices. Compared to DI quantum cryptographic protocols, measurement-device-independent (MDI) quantum cryptographic protocols can achieve higher efficiency with practical implementation while not losing much security, so it is widely studied. To improve practicability and efficiency of QKD, several continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocols were proposed [7,8,9]. In recent years, study on measurement-device independency extends to other types of quantum cryptographic protocols other than QKD. In 2016, Wu et al. [10] proposed a CV MDI multipartite quantum communication protocol, which can implement both quantum cryptographic conference and quantum secret sharing. In 2018, Li et al. [11] tried to solve the practical problem of implementing scalable quantum networks and proposed a CV MDI quantum relay network with phase-sensitive amplifiers. Recently, towards estimating entanglement in a quantum network, MDI entanglement estimation schemes were proposed [12,13].
Since there exist different security problems for different protocols, device independency analysis of other continuous-variable quantum cryptographic protocols except QKD protocols should be explored. Continuous-variable quantum digital signature (CVQDS) [14,15,16] is a sufficiently studied technology in the field of continuous-variable quantum cryptography. It is an essential part of a secure continuous-variable quantum network so its device independency can affect the practical security of a network. However, there is no research on the measurement-device independency of CVQDS. Generally, CVQDS protocols are not device-independent because secret keys are directly passed to the device that generates signatures as a parameter, in which case an attacker can easily obtain the secret keys. Therefore, we assume the devices for quantum state preparation are trusted and perfect, and focus on analyzing the measurement-device independency of CVQDS.
The main contributions of our paper are:
(1) We analyze the measurement-device independency of a continuous-variable quantum digital signature scheme. We point out that a CVQDS protocol is measurement-device-independent if its error rate is negligible on condition that all measurement devices are untrusted. The error rate is composed of two aspects, i.e., probability of a forged signature passing verification and probability of a legal signature being denied. Calculation results show the continuous-variable quantum homomorphic signature scheme is measurement-device-independent.
(2) We simplify the calculation of error rate by means of utilizing the characteristics of continuous variables. The probability of a forged signature passing verification, which is related to the von Neumann entropy of the quantum system in the protocol, is calculated from the covariance matrices of Gaussian states instead of the trace of a infinite-dimensional density matrix. The probability of a legal signature being denied is equivalent to the probability that the absolute value of a random variable is greater than its standard deviation. Since the random variable follows the Gaussian distribution, the probability can be immediately obtained without calculation.

2. Related Works

2.1. Measurement-Device Independency

If a quantum cryptographic protocol can complete its task securely with untrusted measurement devices, it is called a measurement-device-independent protocol. To analyze the security of a quantum cryptographic protocol under the worst case, we assume measurement devices are prepared and controlled by an attacker and can work in the way that is most favorable to the attacker. Concretely, the assumptions are:
(1) An attacker can tamper and forge the output of measurement devices.
(2) An attacker can eavesdrop quantum channels by any means.
For simplicity, we call the above assumptions the MDI assumptions. In other words, if the task of a quantum cryptographic protocol is completed under the MDI assumptions, the protocol is measurement-device-independent.
To date, there are only achievements of MDI analysis for QKD protocols. The first MDI-QKD protocol was proposed by Lo et al. [6], which is a discrete-variable quantum cryptographic protocol. The security proof utilizes the monogamous nature of quantum entanglement and removes detector side-channel attacks while it is not a mathematical proof. In the same year, Ma and Razavi [17] proposed the alternative schemes for MDI-QKD using phase and path or time encoding. In the security analysis, the lower bound of secret key rate was calculated. A protocol is secure if its secret key rate is higher than the lower bound. In 2014, several CV-MDI-QKD protocols were proposed [7]. In the security analysis, the secret key rate of an equivalent one-way CVQKD model was calculated, which is the lower bound for the proposed protocol. Calculation was simplified by applying the theorem of the optimality of Gaussian collective attacks [18]. The analysis of other CV-MDI-QKD protocols [8,9] are similar in calculating the lower bound of secret key rate.
Obviously, we cannot directly calculate the secret key rate of a non-CVQKD protocol, so we should put forward a new method of analyzing its measurement-device independency.

2.2. Continuous-Variable Quantum Homomorphic Signature

In CVQDS protocols, there are usually at most three participants, i.e., a signer, a verifier and an arbitrator. Since the verifier and the arbitrator are assumed to be honest, the only untrusted party is the signer, so it seems easy to analyze measurement-device independency. Nevertheless, in 2017, Li et al. [19] proposed a continuous-variable quantum homomorphic signature (CVQHS) scheme, where an aggregator generates a homomorphic quantum signature for verifying the identities of multiple data sources. The aggregator has access to all quantum and classical data in the network, so the scheme probably will not be secure if an attacker takes control of the devices of the aggregator. The existence of an untrusted aggregator has posed a new challenge in analyzing the measurement-device independency of CVQDS.
Li’s CVQHS scheme is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. The basic model of the CVQHS scheme is shown in Figure 1. A and B are signers, M is an aggregator who aggregates the received signatures to generate two new signatures, and V is a verifier.
The CVQHS scheme is defined by a tuple of algorithms (Setup, Sign, Combine, Verify) and is briefly described as follows.
(1) Setup
Step 1. A shares two secret keys k A 1 and k A 2 with V by continuous-variable quantum key distribution. Meanwhile, B shares two secret keys k B 1 and k B 2 with V. The secret keys are real numbers.
Step 2. M prepares two pairs of entangled states, namely ( | α 1 , | α 2 ) and ( | α 3 , | α 4 ) . Then, M sends | α 2 to A and | α 4 to B.
(2) Sign
Step 1. A signs its classical message a by displacing the quadratures of | α 2 . The signature of A is S k A ( a ) = | α 2 + m A + m k A 1 + m k A 2 = | α 2 , where m A = a + i a , m k A 1 = k A 1 + i k A 1 , and m k A 2 = x k A 2 + i p k A 2 . x k A 2 and p k A 2 are determined by the classical message and k A 2 :
x k A 2 = k A 2 , p k A 2 = 0 i f a + k A 2 i s o d d x k A 2 = 0 , p k A 2 = k A 2 i f a + k A 2 i s e v e n .
Similarly, B signs its classical message b by displacing the quadratures of | α 4 .
Step 2. A sends the signature | α 2 and the classical message m A to M, while B sends the signature | α 4 and the classical message m B to M.
(3) Combine
Step 1. M applies Bell detection on | α 1 and | α 3 and obtains the classical measurement results x 1 = 1 2 ( x 1 + x 3 ) and p 3 = 1 2 ( p 1 p 3 ) .
Step 2. M mixes | α 2 and | α 4 at a 50:50 BS and obtains two new signatures
| α 2 = | 1 2 ( α 2 + α 4 ) | α 4 = | 1 2 ( α 2 α 4 ) .
Step 3. M sends the quantum states | α 1 , | α 2 , | α 3 , | α 4 and the classical message m A + B = m A + m B * to V.
(4) Verify
Step 1. V measures the x quadrature of | α 2 and the p quadrature of | α 4 by homodyne detection and obtains the measurement results x and p .
Step 2. V measures the x quadrature of | α 1 and the p quadrature of | α 3 by homodyne detection and obtains x 1 and p 3 . Then, V calculates x V = 2 ( x 2 τ x 1 ) and p V = 2 ( p 4 τ p 3 ) , where τ is the transmissivity of quantum channels.
Step 3. V calculates a and b from the received classical message m A + B = m A + m B * . Then, V calculates m k A 2 ( B 2 ) , x V = a + k A 1 + x k A 2 + b + k B 1 + x k B 2 , and p V = a + k A 1 + p k A 2 b k B 1 p k B 2 according to pre-shared secret keys. To verify the authenticity and integrity of the signatures, V calculates H x = ( x V τ x V ) 2 and H p = ( p V τ p V ) 2 . If H x H t h and H p H t h , V will confirm that | α 2 and | α 4 are the signatures of M and accept the classical messages a and b. Otherwise, V will deny the signatures. H t h is the verification threshold.

3. Measurement-Device Independency Analysis Method

If the task of a quantum cryptographic protocol is completed under the MDI assumptions, the protocol is measurement-device-independent. The task of CVQHS is to verify the identities of different data sources at a low error rate. Thus, in the measurement-device analysis of the CVQHS scheme, we can calculate the upper bound of the error rate. If the upper bound is negligible under the MDI assumptions, the CVQHS scheme is measurement-device-independent.
The upper bound of the error rate is the error rate under the worst case when an attacker can carry out any possible attack. Thus, we will find out the optimal attack model and calculate the error rate under the model.

3.1. Attack Model

Considering all possible cases which are shown in Figure 2, the error rate is equal to the probability of a forged signature passing verification plus the probability of a legal signature being denied.
Obviously, the probability of a legal signature being denied is only affected by noise. Thus, we only consider the attack model of the case that an attacker tries to forge a signature. In the CVQHS scheme, when an attacker Eve has secret keys and is able to prepare quantum states which are entangled with those at honest signers, it can forge a signature that can pass verification.
Throughout the CVQHS scheme, only the aggregator M and the verifier V use measurement devices. Here, we assume the measurement devices controlled by V are trusted because the protocol will be extremely inefficient and meaningless if the verifier is dishonest. Thus, the MDI assumptions only apply to the measurement devices controlled by M, namely a 50:50 BS and two homodyne detectors which are used to perform Bell detection, and a 50:50 BS for mixing two quantum signatures. According to Assumption (1), Eve is able to tamper and forge the results of Bell detection and the mixtures of quantum signatures at the combining phase. Thus, Eve can forge a quantum signature that can pass verification as long as it obtains the pre-shared secret keys. Thus, the security of the CVQHS scheme is guaranteed by the secrecy of secret keys. The probability of a forged signature passing verification is equal to the probability of Eve obtaining secret keys. At this point, the complicated attack model which contains forgery is simplified as a simple eavesdropping model.
According to Assumption (2), Eve is able to eavesdrop all quantum channels by any means. From the perspective of an attacker’s ability, eavesdropping can be divided into three types, namely coherent attack, collective attack and individual attack. Coherent attack is the most general attack by which an attacker can perform joint quantum operations and joint measurement to all quantum states sent via quantum channels. The proof of security against coherent attack is the strictest proof for security, but the model of coherent attack cannot be effectively parameterized. A common approach is to extend the security against collective attack to coherent attack by using the exponential de Finetti theorem [20]. Collective attack is a special case of coherent attack, where an attacker can only perform quantum operations individually on each quantum state.
Fortunately, analysis shows that the security bound under coherent attack is the same as that under collective attack for QKD protocols [21]. This result can be applied to CVQHS because a signature in the scheme is a single quantum state. The quantum states in a quantum channel are not correlated, so introducing correlations to them by performing joint operations will not help the attacker obtain more information. Therefore, we can analyze the security against collective attack.

3.2. Probability of a Forged Signature Passing Verification

At the first step of the setup phase, the signers and the verifier share secret keys. Assume they use a MDI-QKD protocol in this step; then, Eve can only obtain the secret keys by eavesdropping the quantum channels. The information on the secret keys that Eve can obtain is the mutual information I ( k : E ) , where k = ( k 1 , k 2 ) denotes the secret keys and E is the quantum system of Eve. The larger the mutual information I ( k : E ) is, the more information Eve can obtain. When I ( k : E ) = H ( k ) , Eve can recover the secret keys accurately. The upper bound of I ( k : E ) is usually used to estimate the security of a protocol.
According to the symmetry of CVQHS, we only need to calculate the upper bounds of I ( k A 1 : E ) and I ( k A 2 : E ) . According to quantum information theory, it is known that I ( k A 1 : E ) χ ( k A 1 : E ) , where χ ( k A 1 : E ) is the Holevo bound [22]. It can be calculated that χ ( k A 1 : E ) = S ( ρ ^ E ) S ( ρ ^ E | k A 1 ) under collective attack, where S ( ρ ^ E | k A 1 ) = p ( k A 1 ) S ( ρ ^ E | k A 1 ) d k A 1 and ρ ^ E is the quantum system of Eve. According to assumption (1) aforementioned in Section 2.1, Eve can purify the whole quantum system, so χ ( k A 1 : E ) = χ ( k A 1 : ρ ^ 1 2 3 4 ) , where ρ ^ 1 2 3 4 = | α 1 | α 2 | α 3 | α 4 . Because | α 1 and | α 3 are independent of the secret keys, their entropy will be offset during subtraction. Thus, S ( ρ ^ E ) S ( ρ ^ E | k A 1 ) = S ( ρ ^ 2 4 ) S ( ρ ^ 2 4 | k A 1 ) , where ρ ^ 2 4 = | α 2 | α 4 .
The quantum states in the CVQHS scheme are Gaussian states, whose von Neumann entropy can be calculated based on their covariance matrices. Assume the original entangled states prepared by the aggregator have the same density matrix, i.e., ρ 12 = ρ 34 = ρ in . Their covariance matrix is
V i n = V I V 2 1 d i a g ( 1 , 1 ) V 2 1 d i a g ( 1 , 1 ) V I ,
where V = cosh 2 r is the variance of two-mode squeezed states. Assume the quantum channels are modeled as
| α | τ α + 1 τ α N ,
where τ ( 0 < τ < 1 ) is transmissivity and | α N = | x N + i p N is thermal noise. Assume thermal noise in each quantum channel is independently and identically distributed and their quadratures follow Gaussian distribution: x N , p N N ( 0 , V N ) .
After | α 2 and | α 4 are transmitted twice via noisy quantum channels, the covariance matrix becomes
V i n = V 1 I V 1 2 1 d i a g ( 1 , 1 ) V 1 2 1 d i a g ( 1 , 1 ) V 1 I ,
where V 1 = τ 2 V + ( τ + 1 ) V N .
After entanglement swapping, the covariance matrix of ρ ^ 2 4 = | α 2 | α 4 is
V 2 4 = 1 2 V 1 d i a g ( V 1 2 + 1 , V 1 2 + 1 ) d i a g ( V 1 2 1 , V 1 2 + 1 ) d i a g ( V 1 2 1 , V 1 2 + 1 ) d i a g ( V 1 2 + 1 , V 1 2 + 1 ) .
Then, | α 2 and | α 4 are mixed at a 50:50 beam splitter, outputting | α 2 and | α 4 . Beam splitter is a Gaussian operator, which does not change the von Neumann entropy of a quantum system. Thus, the von Neumann entropy of ρ ^ 2 4 can be calculated based on V 2 4 .
S ( ρ ^ 2 4 | k A 1 ) is the von Neumann entropy of ρ ^ 2 4 when k A 1 is given. It can be calculated based on a new covariance matrix
V 2 4 | k A 1 = 1 2 V d i a g ( V 2 + 1 , V 2 + 1 ) d i a g ( V 2 1 , V 2 + 1 ) d i a g ( V 2 1 , V 2 + 1 ) d i a g ( V 2 + 1 , V 2 + 1 ) ,
where V = V 1 V k A 1 .
Simple calculation shows that I ( k A 1 : E ) = 0 , which means Eve cannot obtain any information on k A 1 . Similarly, we can calculate that I ( k A 2 : E ) = 0 . Thus, Eve cannot obtain any information on the pre-shared secret keys between the signers and the verifier. The probability of a forged signature passing verification is the probability of Eve guessing the exact secret keys, which is negligible.
In the above theoretical analysis, we only considered the case of collective attack, which is proved to be the optimal attack model. In fact, simulation or experiment considering more complex scenarios can be conducted to verify our calculation results in future works. It will be much easier to obtain the error rate for complex scenarios such as coherent attack and forgery, which involve complex modeling and calculation in theoretical analysis and cannot be efficiently parameterized [21]. Special attack models may be also implemented to discuss how parameters affect the result of CVQHS.

3.3. Probability of a Legal Signature Being Denied

In the CVQHS scheme, if the deviation between the value calculated from a signature and the value calculated from pre-shared messages is larger than certain verification threshold, the signature will be denied by the verifier. The deviation can be caused by an attacker or noise. Here, it is assumed that the verifier receives a signature that is generated by a legal signer and not tampered by an attacker. Thus, the probability only depends on noise.
A verification threshold H t h in a noisy environment is given in Ref. [19], which is equal to the variance of x V τ x V . In the verification phase, the verifier compares ( x V τ x V ) 2 , ( p V τ p V ) 2 and H t h . If ( x V τ x V ) 2 > H t h or ( p V τ p V ) 2 > H t h , it will deny the signature. Denote x V τ x V as a random variable X whose first and second moments are E X = 0 and D X = H t h . Thus, the probability of a legal signature being denied is
P ( X 2 > H t h ) = P ( X 2 > D X ) = P ( | X | > D X )
Since X is a linear combination of quadratures, secret keys and classical messages, it follows the Gaussian distribution. According to the property of Gaussian distribution, P ( X 2 > H t h ) 0 . 32 . Thus, the probability of a legal signature being denied is 0.32.
By adding up two probabilities in Section 3.2 and Section 3.3, we can conclude that the upper bound of the error rate of the CVQHS scheme is 0.32 when all measurement devices are untrusted. Although 0.32 is not negligible, the probability of correctly verifying the identities is twice of error rate. Thus, the CVQHS scheme is deemed to be measurement-device-independent.

3.4. Discussion

Firstly, we discuss how the parameters of the CVQHS scheme affect the error rate.
The calculation of probability of a forged signature passing verification involves three parameters, namely the variance V of two-mode squeezed states, the transmissivity τ of quantum channels, and the variance V N of thermal noise of quantum channels. According to calculation result, the probability is always 0 provided V is nonzero, which means an attacker cannot obtain the pre-shared secret keys as long as the entangled states are properly prepared and not collapsed before being used for generating quantum signatures. Noisy quantum channels do not have any influence on the probability of a forged signature passing verification. It is the randomness of quantum states that prevents the pre-shared secret keys from being leaked during transmission.
The calculation of probability of a legal signature being denied involves the values of both quadratures of entangled states, pre-shared secret keys, the transmissivity and the variance of thermal noise of quantum channels, and the verification threshold. In the calculation, the parameters follow Gaussian distribution so the probability can be easily obtained. The probability is influenced by the verification threshold H t h . If H t h is larger, the will decrease but it will be easier for a forged quantum signature to pass verification. If H t h is smaller, the probability will increase. Thus, the verification should be carefully set in order to lower the error rate.
Secondly, we discuss the application of our analysis method. Our analysis method can be summarized in the following three steps:
Step 1. Analyze the objective of the protocol and find the parameter that can be used to decide whether the protocol has completed its task.
Step 2. Analyze the topology and the communication pattern of the protocol to obtain a simplified attack model, which may be a sufficiently studied attack.
Step 3. Calculate the parameter under the attack model to judge the measurement-device independency of the protocol.
In our analysis procedure, the parameter is the upper bound of error rate and the attack model can be simplified as collective attack. Although we only analyze the CVQHS scheme, the analysis method can be applied to other CVQDS protocols by means of calculating the same parameter under a similar attack model.
Concretely, the objective of a CVQDS protocol is to verify the identity of a data source, which is the same as the CVQHS scheme. Thus, at Step 1, the parameter will be the upper bound of error rate as well. From the perspective of verification results, errors can be classified into two types. The first type of error is the case where a tampered or forged quantum signature passes verification. The second type of error is the case where a legal quantum signature which is not tampered by attackers gets denied by the verifier. To calculate the error rate, we should respectively construct models for the two type of errors. The first type of error usually evolves attackers so we should construct an attack model. The second type of error is caused by noise so we should also construct a model for noisy quantum channels.
Constructing an attack model at Step 2 is the key step of our MDI analysis method. The most effective way of attack can be found by means of applying MDI assumptions to the protocol. Attack models may be different for different CVQDS protocols if the protocols have different network topologies and communication patterns. Since most of the CVQDS protocols do not involve an untrusted aggregator, we believe attack models for CVQDS protocols will be simpler than the CVQHS scheme. Furthermore, it seems that the attack model of a CVQDS protocol can often become an eavesdropping model because it is necessary for an attacker to obtain secret keys. After simplification, the calculation process at Step 3 will be similar to our calculation.
The above analysis procedure seems to be a general formalism for analyzing measurement-device independency. In this procedure, the key point of analyzing a protocol is to find an appropriate parameter and constructing an attack model. For a complicated protocol carried out in a large-scale network, it may have several tasks that affect each other and each task is completed by several nodes. It will be difficult to find an appropriate parameter at Step 1. In addition, unintended entanglement among different nodes will not only affect the quantum states transmitted between two legal nodes in an unexpected way, but also increase the complexity of analysis and calculation. It will be difficult to construct an attack model that is simple enough for calculation. Thus, MDI analysis method of quantum cryptographic protocols except CVQDS protocols still needs to be explored.

4. Conclusions

In this paper, we analyze the measurement-device independency of continuous-variable quantum digital signature. According to the objective of CVQDS, we proposed that a CVQDS protocol is measurement-device-independent if its error rate is negligible on condition that all measurement devices are untrusted. Concretely, we take a continuous-variable quantum homomorphic signature protocol as an example. The error rate of the CVQHS scheme is equal to the probability of a forged signature passing verification plus the probability of a legal signature being denied. In the analysis procedure, we constructed an attack model in order to calculate the error rate. The attack model was simplified as collective attack by means of applying MDI assumptions to the protocol. Calculation was also simplified by using an advantage of Gaussian states, i.e., the von Neumann entropy of a Gaussian state can be calculated from its first and second moments. Calculation results show that the error rate is 0.32 so that the CVQHS scheme is deemed to be measurement-device-independent. Although we only analyzed the measurement-device independency of the CVQHS scheme, our analysis can be summarized in three steps and applied to other CVQDS protocols. Whether this approach is a general formalism for analyzing the measurement-device independency of all quantum protocols is still an open question and will be discussed in future works.

Acknowledgments

This project was supported by the National Natural Science Foundation of China (No. 61571024) and the National Key Research and Development Program of China (No. 2016YFC1000307).

Author Contributions

Tao Shang proposed the idea. Most of the conclusions were proven by Tao Shang, Ke Li and Jianwei Liu. Tao Shang and Ke Li wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
QKDQuantum Key Distribution
DIDevice-Independent
MDIMeasurement-Device-Independent
DI-QKDDevice-Independent Quantum Key Distribution
MDI-QKDMeasurement-Device-Independent Quantum Key Distribution
CV-MDI-QKDContinuous-Variable Measurement-Device-Independent Quantum Key Distribution
CVQDSContinuous-Variable Quantum Digital Signature
CVQHSContinuous-Variable Quantum Homomorphic Signature
BSBeam Splitter

References

  1. Acin, A.; Gisin, N.; Masanes, L. From Bell’s theorem to secure quantum key distribution. Phys. Rev. Lett. 2006, 97, 120405. [Google Scholar] [CrossRef] [PubMed]
  2. Acín, A.; Brunner, N.; Gisin, N.; Massar, S.; Pironio, S.; Scarani, V. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 2007, 98, 230501. [Google Scholar] [CrossRef] [PubMed]
  3. Acín, A.; Brunner, N.; Gisin, N.; Massar, S.; Pironio, S.; Scarani, V. Device-independent quantum key distribution secure against collective attacks. New J. Phys. 2009, 11, 045021. [Google Scholar] [CrossRef]
  4. Masanes, L.; Pironio, S.; Acin, A. Secure device-independent quantum key distribution with causally independent measurement devices. Nat. Commun. 2011, 2, 238. [Google Scholar] [CrossRef] [PubMed]
  5. Vazirani, U.; Vidick, T. Fully device-independent quantum key distribution. Phys. Rev. Lett. 2014, 113, 140501. [Google Scholar] [CrossRef] [PubMed]
  6. Lo, H.K.; Curty, M.; Qi, B. Measurement-Device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed]
  7. Li, Z.; Zhang, Y.C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar] [CrossRef]
  8. Zhang, Y.C.; Li, Z.; Yu, S.; Gu, W.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys. Rev. A 2014, 90, 052325. [Google Scholar] [CrossRef]
  9. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photon. 2015, 9, 397–402. [Google Scholar] [CrossRef] [Green Version]
  10. Wu, Y.; Zhou, J.; Gong, X.; Guo, Y.; Zhang, Z.M.; He, G. Continuous-variable measurement-device-independent multipartite quantum communication. Phys. Rev. A 2016, 93, 022325. [Google Scholar] [CrossRef]
  11. Li, F.; Zhao, W.; Guo, Y. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers. Int. J. Theor. Phys. 2018, 57, 112–126. [Google Scholar] [CrossRef]
  12. Supic, I.; Skrzypczyk, P.; Cavalcanti, D. Measurement-device-independent entanglement and randomness estimation in quantum networks. Phys. Rev. A 2017, 95, 042340. [Google Scholar] [CrossRef]
  13. Rosset, D.; Martin, A.; Verbanis, E.; Lim, C.C.W.; Thew, R. Practical measurement-device-independent entanglement quantification. arXiv, 2017; arXiv:1709.03090. [Google Scholar]
  14. Zeng, G.; Lee, M.; Guo, Y.; He, G. Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 2007, 5, 553–573. [Google Scholar] [CrossRef]
  15. Guo, Y.; Feng, Y.; Huang, D.; Shi, J. Arbitrated quantum signature scheme with continuous-variable coherent states. Int. J. Theor. Phys. 2016, 55, 2290–2302. [Google Scholar] [CrossRef]
  16. Donaldson, R.J.; Collins, R.J.; Kleczkowska, K.; Amiri, R.; Wallden, P.; Dunjko, V.; Jeffers, J.; Andersson, E.; Buller, G.S. Experimental demonstration of kilometer-range quantum digital signatures. Phys. Rev. A 2016, 93, 012329. [Google Scholar] [CrossRef]
  17. Ma, X.F.; Razavi, M. Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 2012, 86, 062319. [Google Scholar] [CrossRef]
  18. Navascues, M.; Grosshans, F.; Acin, A. Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef] [PubMed]
  19. Li, K.; Shang, T.; Liu, J.W. Continuous-variable quantum homomorphic signature. Quantum Inf. Process. 2017, 16, 246. [Google Scholar] [CrossRef]
  20. Renner, R.; Cirac, J.I. de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 2009, 102, 110504. [Google Scholar] [CrossRef] [PubMed]
  21. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301. [Google Scholar] [CrossRef]
  22. Holevo, A.S. Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Peredachi Inf. 1973, 9, 3–11. [Google Scholar]
Figure 1. Basic model of CVQHS.
Figure 1. Basic model of CVQHS.
Entropy 20 00291 g001
Figure 2. Possible errors in CVQHS.
Figure 2. Possible errors in CVQHS.
Entropy 20 00291 g002

Share and Cite

MDPI and ACS Style

Shang, T.; Li, K.; Liu, J. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature. Entropy 2018, 20, 291. https://0-doi-org.brum.beds.ac.uk/10.3390/e20040291

AMA Style

Shang T, Li K, Liu J. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature. Entropy. 2018; 20(4):291. https://0-doi-org.brum.beds.ac.uk/10.3390/e20040291

Chicago/Turabian Style

Shang, Tao, Ke Li, and Jianwei Liu. 2018. "Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature" Entropy 20, no. 4: 291. https://0-doi-org.brum.beds.ac.uk/10.3390/e20040291

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop