-
Revocation and Reconstruction of Shared Quantum Secrets
Authors:
Prakash Mudholkar,
Chiranjeevi Vanarasa,
Indranil Chakrabarty,
Srinathan Kannan
Abstract:
In Quantum secret sharing we can share both quantum and classical secrets with a quantum resource. In this article we study the problem of revocation of quantum secret shared by the dealer with two shareholders in a three party scenario. In the existing secret sharing protocols there are no means by which the dealer can retrieve back the secret once he/she finds all the share holders to be semi-ho…
▽ More
In Quantum secret sharing we can share both quantum and classical secrets with a quantum resource. In this article we study the problem of revocation of quantum secret shared by the dealer with two shareholders in a three party scenario. In the existing secret sharing protocols there are no means by which the dealer can retrieve back the secret once he/she finds all the share holders to be semi-honest. In this work, we are not dealing with shareholders who are dishonest. We state clearly that in our quantum secret sharing protocol, we explicitly deal with shareholders who are semi-honest and not dishonest. Our protocol makes a significant advancement in solving this problem by designing strategy in bringing back the secret in the worst possible situation when all the shareholders/receivers are semi-honest. In our proposed strategy the dealer also possesses a quantum share of the secret which empowers the dealer to bring back the secret even after sharing is done. However the protocol along with the revocation process also ensures the normal reconstruction at the share holder's location when they are honest. This advantage comes with the expense of extra one qubit on dealer's side and consequently we require a four qubit resource to start with for 1-dealer and 2-share holder's scenario. Here in this article we not only give the description of our protocol but also give an example where our protocol is working with the help of a four qubit entangled state. We also explicitly found out the range of parameter for the input state for which the protocol will be successful.
△ Less
Submitted 31 March, 2023; v1 submitted 31 December, 2021;
originally announced December 2021.
-
Impossibility of Cloning of Quantum Coherence
Authors:
Dhrumil Patel,
Subhasree Patro,
Chiranjeevi Vanarasa,
Indranil Chakrabarty,
Arun Kumar Pati
Abstract:
It is well known that it is impossible to clone an arbitrary quantum state. However, this inability does not lead directly to no-cloning of quantum coherence. Here, we show that it is impossible to clone the coherence of an arbitrary quantum state which is a stronger statement than the 'no-cloning of quantum state'. In particular, with ancillary system as machine state, we show that it is impossib…
▽ More
It is well known that it is impossible to clone an arbitrary quantum state. However, this inability does not lead directly to no-cloning of quantum coherence. Here, we show that it is impossible to clone the coherence of an arbitrary quantum state which is a stronger statement than the 'no-cloning of quantum state'. In particular, with ancillary system as machine state, we show that it is impossible to clone the coherence of states whose coherence is greater than the coherence of the known states on which the transformations are defined. Also, we characterize the class of states for which coherence cloning will be possible for a given choice of machine. Furthermore, we find the maximum range of states whose coherence can be cloned perfectly. The impossibility proof also holds when we do not include machine states.
△ Less
Submitted 14 June, 2018;
originally announced June 2018.
-
Retrieving and Routing Quantum Information in a Quantum Network
Authors:
Sk Sazim,
Chiranjeevi Vanarasa,
Indranil Chakrabarty,
Kannan Srinathan
Abstract:
In extant quantum secret sharing protocols, once the secret is shared in a quantum network (\textsc{qnet}) it can not be retrieved back, even if the dealer wishes that her secret no longer be available in the network. For instance, if the dealer is part of two \textsc{qnet}s, say $\mathcal{Q}_1$ and $\mathcal{Q}_2$ and subsequently finds that $\mathcal{Q}_2$ is more reliable than $\mathcal{Q}_1$,…
▽ More
In extant quantum secret sharing protocols, once the secret is shared in a quantum network (\textsc{qnet}) it can not be retrieved back, even if the dealer wishes that her secret no longer be available in the network. For instance, if the dealer is part of two \textsc{qnet}s, say $\mathcal{Q}_1$ and $\mathcal{Q}_2$ and subsequently finds that $\mathcal{Q}_2$ is more reliable than $\mathcal{Q}_1$, the dealer may wish to transfer all her secrets from $\mathcal{Q}_1$ to $\mathcal{Q}_2$. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, no-cloning-theorem automatically ensures that the secret is no longer shared in the network.
The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous \textsc{qnets}. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the \textsc{qnet}. For example, we show that a source $S$ can send quantum information to a destination $R$ even though (a) $S$ and $R$ share no quantum resource, (b) $R$'s identity is {\em unknown}\/ to $S$ initially, (c) $S$ herself can be $R$ at a later date and/or in a different location to bequeath her information and (d) the path chosen for routing the secret may hit a dead-end due to resource constraints. Another implication of our technique is the possibility of using {\em insecure}\/ resources. For instance, it may safely store its private information with a neighboring organization without revealing data to the host and losing control over retrieving the data.
Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.
△ Less
Submitted 19 September, 2015; v1 submitted 21 November, 2013;
originally announced November 2013.