Geometry of Banach Spaces: A New Route Towards Position Based Cryptography

@article{Junge2022GeometryOB,
  title={Geometry of Banach Spaces: A New Route Towards Position Based Cryptography},
  author={Marius Junge and Aleksander M. Kubicki and Carlos Palazuelos and David P'erez-Garc'ia},
  journal={Communications in Mathematical Physics},
  year={2022}
}
In this work we initiate the study of position based quantum cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games. The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol. Known upper bounds for that quantity are exponential in the size of the quantum systems manipulated in the honest implementation of the… 
Complexity and entanglement in non-local computation and holography
Does gravity constrain computation? We study this question using the AdS/CFT correspondence, where computation in the presence of gravity can be related to non-gravitational physics in the boundary
Non-local computation of quantum circuits with small light cones
The task of non-local quantum computation requires implementation of a unitary on n qubits between two parties with only one round of communication, ideally with minimal pre-shared entanglement. We
Beating Classical Impossibility of Position Verification
TLDR
This work identifies that proofs of quantumness (and thus computational assumptions) are necessary for position verification protocols with classical verifiers, and adapts the proof ofquantumness protocol by Brakerski et al. (FOCS ’18) to instantiate such a position verification protocol.
Asymptotic Tensor Powers of Banach Spaces
We study the asymptotic behaviour of large tensor powers of normed spaces and of operators between them. We define the tensor radius of a finite-dimensional normed space X as the limit of the
New Protocols and Ideas for Practical Quantum Position Verification
TLDR
This work proposes a new fully loss-tolerant QPV protocol, based on the SWAP test, with several desirable properties, and proves full loss tolerance against unentangled attackers restricted to local operations and classical communication (LOCC), and that the attack probability decays exponentially under parallel repetition of rounds.
Position-based cryptography: Single-qubit protocol secure against multi-qubit attacks
TLDR
This work shows for the first time that there exists a quantum position verification protocol where the ratio between the quantum Resources an honest prover needs and the quantum resources the attackers need to break the protocol is unbounded.

References

SHOWING 1-10 OF 72 REFERENCES
Programmable Quantum Gate Arrays
TLDR
The processor presented can perform any operation on a single qubit with a certain probability and if the operation is unitary, the probability is in general 1/4, but for more restricted sets of operators the probability can be higher.
Position-based cryptography: Single-qubit protocol secure against multi-qubit attacks
TLDR
This work shows for the first time that there exists a quantum position verification protocol where the ratio between the quantum Resources an honest prover needs and the quantum resources the attackers need to break the protocol is unbounded.
Position-Based Quantum Cryptography: Impossibility and Constructions
TLDR
It is proved that with the help of sufficient pre-shared entanglement, any non-local quantum computation, i.e., any computation that involves quantum inputs from two parties at different locations, can be performed instantaneously and without any communication, up to local corrections that need to be applied to the outputs.
Simplified instantaneous non-local quantum computation with applications to position-based cryptography
TLDR
Novel protocols are proposed for instantaneous measurements of non-local observables between space-like separated regions and it is proved that certain schemes are secure under the assumption that the adversary has less entanglement than a given bound and is restricted to classical communication.
Holographic scattering requires a connected entanglement wedge
In AdS/CFT, there can exist local 2-to-2 bulk scattering processes even when local scattering is not possible on the boundary; these have previously been studied in connection with boundary
Quantum tasks in holography, 2019
  • 2019
THE SCHATTEN SPACE S 4 IS A Q -ALGEBRA
. For any 1 ≤ p ≤ ∞ , let S p denote the classical p -Schatten space of operators on the Hilbert space (cid:96) 2 . It was shown by Varopoulos (for p ≥ 2) and by Blecher and the author (full result)
{m
TLDR
The master programme in Applied Geology aims to provide comprehensive knowledge based on various branches of Geology, with special focus on Applied geology subjects in the areas of Geomorphology, Structural geology, Hydrogeology, Petroleum Geologists, Mining Geology), Remote Sensing and Environmental geology.
Type
TLDR
It was shown that insulin secretion in islet transplant recipients is pulsatile and glucose-induced insulin secretion is accomplished through amplification of pulse size, which provides a rationale for evaluating Kv1.3 inhibitors as a therapy for type 1 diabetes and for preventing autoimmune destruction of HLA-matched grafted islets.
On nearly euclidean decomposition for some classes of Banach spaces
We introduce a new affine invariant of finite dimensional normed space. Using it we show that for some large classes of finite dimensional normed spaces there is a constant C such that every normed
...
...