Quantum Location Verification in Noisy Channels

Recently it has been shown how the use of quantum entanglement can lead to the creation of real-time communication channels whose viability can be made location dependent. Such functionality leads to new security paradigms that are not possible in classical communication networks. Key to these new security paradigms are quantum protocols that can unconditionally determine that a receiver is in fact at an a priori assigned location. A limiting factor of such quantum protocols will be the decoherence of states held in quantum memory. Here we investigate the performance of quantum location verification protocols under decoherence effects. More specifically, we address the issue of how decoherence impacts the verification using N = 2 qubits entangled as Bell states, as compared to N > 2 qubits entangled as GHZ states. We study the original quantum location verification protocol, as well as a variant protocol, introduced here, which utilizes teleportation. We find that the performance of quantum location verification is in fact similar for Bell states and some N > 2 GHZ states, even though quantum decoherence degrades larger-qubit entanglements faster. Our results are important for the design and implementation of location-dependent communications in emerging quantum networks.

[1]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[2]  R. F. Werner,et al.  Quantum lost and found , 2002, quant-ph/0209025.

[3]  H. Weinfurter,et al.  Free-Space distribution of entanglement and single photons over 144 km , 2006, quant-ph/0607182.

[4]  Carlton M. Caves,et al.  Qubit metrology and decoherence , 2007, 0705.1002.

[5]  Robert A. Malaney,et al.  Location-dependent communications using quantum entanglement , 2010, 1003.0949.

[6]  Jian-Wei Pan,et al.  Experimental demonstration of a hyper-entangled ten-qubit Schr\ , 2008, 0809.4277.

[7]  Christoph Simon,et al.  Robust and efficient quantum repeaters with atomic ensembles and linear optics , 2008, 0802.1475.

[8]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[9]  Robert Prevedel,et al.  High-fidelity entanglement swapping with fully independent sources , 2008, 0809.3991.

[10]  Yih-Chun Hu,et al.  Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.

[11]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[12]  A. Zeilinger,et al.  Going Beyond Bell’s Theorem , 2007, 0712.0921.

[13]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[14]  Nicolas J. Cerf,et al.  Cloning the entanglement of a pair of quantum bits , 2004 .

[15]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[16]  Christoph Pacher,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[17]  S. Lloyd,et al.  Quantum-enhanced positioning and clock synchronization , 2001, Nature.

[18]  Dorothy E. Denning,et al.  Geo-Encryption: Using GPS to Enhance Data Security , 2003 .

[19]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and EPR channels , 1993 .

[20]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[21]  E. Karpov,et al.  Cloning quantum entanglement in arbitrary dimensions , 2005 .

[22]  Robert A. Malaney Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.

[23]  M. Nakahara QUANTUM COMPUTING: AN OVERVIEW , 2008 .

[24]  Charles H. Bennett,et al.  WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .

[25]  H. Weinfurter,et al.  Entanglement-based quantum communication over 144km , 2007 .