Verification of quantum-gate teleportation based on Bell nonlocality in a black-box scenario

被引:5
|
作者
Wang, Zi-Qi
Wang, Tie-Jun [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Informat Photon & Opt Commun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
COMPUTATION; VECTOR;
D O I
10.1103/PhysRevA.108.012434
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum gate teleportation (QGT) is an excellent candidate for implementing remote quantum gate operations in large-scale quantum computer networks as it has the minimum resource demand to realize such computing models. The Bell nonlocality of quantum entanglement channel in QGT can be transformed into the corresponding posterior statistics correlation obtained by local measurements after QGT operation, and this Bell-type-like correlation can be used to check device and measurement loopholes or information leaking in the teleportation systems. In this paper, we propose a verification scheme based on Bell nonlocality for quantum CNOT gate teleportation in a black-box scenario where the vendors may not be trusted. The double criteria of high fidelity ((F) over bar > 97.53%) and high CHSH inequality violation (CHSH > 2) are used for assessing a vendor's reliability. The clients can use our scheme to check whether vendors employ classical simulation techniques to forge nonlocal quantum computing processes and it could provide a secure manner for the construction of quantum computer networks in the future.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (Competition Contribution)
    Aljaafari, Fatimah
    Shmarov, Fedor
    Manino, Edoardo
    Menezes, Rafael
    Cordeiro, Lucas C.
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT II, TACAS 2023, 2023, 13994 : 541 - 546
  • [32] HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations
    Sivakorn, Suphannee
    Argyros, George
    Pei, Kexin
    Keromytis, Angelos D.
    Jana, Suman
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 521 - 538
  • [33] Self-Improving Safety Performance of Reinforcement Learning Based Driving with Black-Box Verification Algorithms
    Dagdanov, Resul
    Durmus, Halil
    Ure, Nazim Kemal
    2023 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, ICRA, 2023, : 5631 - 5637
  • [34] Surrogate-based methods for black-box optimization
    Ky Khac Vu
    D'Ambrosio, Claudia
    Hamadi, Youssef
    Liberti, Leo
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2017, 24 (03) : 393 - 424
  • [35] Black-Box Boundary Attack Based on Gradient Optimization
    Yang, Yuli
    Liu, Zishuo
    Lei, Zhen
    Wu, Shuhong
    Chen, Yongle
    ELECTRONICS, 2024, 13 (06)
  • [36] Black-box testing based on colorful taint analysis
    CHEN Kai1
    2State Key Laboratory of Information Security
    3National Engineering Research Center of Information Security
    ScienceChina(InformationSciences), 2012, 55 (01) : 171 - 183
  • [37] Black-box testing based on colorful taint analysis
    Chen Kai
    Feng DengGuo
    Su PuRui
    Zhang YingJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (01) : 171 - 183
  • [38] Black-box testing based on colorful taint analysis
    Kai Chen
    DengGuo Feng
    PuRui Su
    YingJun Zhang
    Science China Information Sciences, 2012, 55 : 171 - 183
  • [39] An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II
    Zhang, Chunkai
    Deng, Yepeng
    Guo, Xin
    Wang, Xuan
    Liu, Chuanyi
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 603 - 612
  • [40] Adaptive Scenario Subset Selection for Min-Max Black-Box Continuous Optimization
    Miyagi, Atsuhiro
    Fukuchi, Kazuto
    Sakuma, Jun
    Akimoto, Youhei
    PROCEEDINGS OF THE 2021 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'21), 2021, : 697 - 705