Skip to main content

Showing 1–24 of 24 results for author: Murta, G

Searching in archive quant-ph. Search in all archives.
.
  1. Experimental anonymous quantum conferencing

    Authors: Jonathan W. Webb, Joseph Ho, Federico Grasselli, Gláucia Murta, Alexander Pickston, Andrés Ulibarrena, Alessandro Fedrizzi

    Abstract: Anonymous quantum conference key agreement (AQCKA) allows a group of users within a network to establish a shared cryptographic key without revealing their participation. Although this can be achieved using bi-partite primitives alone, it is costly in the number of network rounds required. By allowing the use of multi-partite entanglement, there is a substantial efficiency improvement. We experime… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

    Journal ref: Optica 11, 872 (2024)

  2. arXiv:2305.10587  [pdf, other

    quant-ph

    Self-testing with dishonest parties and device-independent entanglement certification in quantum networks

    Authors: Gláucia Murta, Flavio Baccari

    Abstract: Here we consider the task of device-independent certification of the quantum state distributed in a network when some of the nodes in this network may collude and act dishonestly. We introduce the paradigm of self-testing with dishonest parties and present a protocol to self-test the GHZ state in this framework. We apply this result for state certification in a network with dishonest parties and a… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: 6+8 pages, 3 figures

  3. Continuity of robustness measures in quantum resource theories

    Authors: Jonathan Schluck, Gláucia Murta, Hermann Kampermann, Dagmar Bruß, Nikolai Wyderka

    Abstract: Robustness measures are increasingly prominent resource quantifiers that have been introduced for quantum resource theories such as entanglement and coherence. Despite the generality of these measures, their usefulness is hindered by the fact that some of their mathematical properties remain unclear, especially when the set of resource-free states is non-convex. In this paper, we investigate conti… ▽ More

    Submitted 1 June, 2023; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: 13 pages, 3 figures

    Journal ref: J. Phys. A: Math. Theor. 56, 255303 (2023)

  4. Overcoming fundamental bounds on quantum conference key agreement

    Authors: Giacomo Carrara, Gláucia Murta, Federico Grasselli

    Abstract: Twin-Field Quantum Key Distribution (TF-QKD) enables two distant parties to establish a shared secret key, by interfering weak coherent pulses (WCPs) in an intermediate measuring station. This allows TF-QKD to reach greater distances than traditional QKD schemes and makes it the only scheme capable of beating the repeaterless bound on the bipartite private capacity. Here, we generalize TF-QKD to t… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: 10 + 26 pages, 5 figures

    Journal ref: Phys. Rev. Applied 19, 064017 (2023)

  5. Boosting device-independent cryptography with tripartite nonlocality

    Authors: Federico Grasselli, Gláucia Murta, Hermann Kampermann, Dagmar Bruß

    Abstract: Device-independent (DI) protocols, such as DI conference key agreement (DICKA) and DI randomness expansion (DIRE), certify private randomness by observing nonlocal correlations when two or more parties test a Bell inequality. While most DI protocols are restricted to bipartite Bell tests, harnessing multipartite nonlocal correlations may lead to better performance. Here, we consider tripartite DIC… ▽ More

    Submitted 12 April, 2023; v1 submitted 26 September, 2022; originally announced September 2022.

    Comments: 12 pages main text, 36 pages in total. 5 figures, 3 tables

    Journal ref: Quantum 7, 980 (2023)

  6. Secure Anonymous Conferencing in Quantum Networks

    Authors: Federico Grasselli, Gláucia Murta, Jarn de Jong, Frederik Hahn, Dagmar Bruß, Hermann Kampermann, Anna Pappa

    Abstract: Users of quantum networks can securely communicate via so-called (quantum) conference key agreement --making their identities publicly known. In certain circumstances, however, communicating users demand anonymity. Here, we introduce a security framework for anonymous conference key agreement with different levels of anonymity, which is inspired by the epsilon-security of quantum key distribution.… ▽ More

    Submitted 26 July, 2022; v1 submitted 9 November, 2021; originally announced November 2021.

    Comments: 23 pages and 3 figures. The Supplemental Material is placed at the end of the manuscript. Main changes with respect to previous version: new title, Introduction section reworked, references added, section 10 added in the Supplemental Material

  7. Genuine multipartite entanglement is not a precondition for secure conference key agreement

    Authors: Giacomo Carrara, Hermann Kampermann, Dagmar Bruß, Gláucia Murta

    Abstract: Entanglement plays a crucial role in the security of quantum key distribution. A secret key can only be obtained by two parties if there exists a corresponding entanglement-based description of the protocol in which entanglement is witnessed, as shown by Curty et al (2004). Here we investigate the role of entanglement for the generalization of quantum key distribution to the multipartite scenario,… ▽ More

    Submitted 16 November, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 5 + 5 pages, 4 figures. v02: Strengthened results, including performance of the family of biseparable states under consideration for the N-BB84 protocol. Section III of supplemental material of v01 removed, as it contained an example state mistakenly claimed to be biseparable

    Journal ref: Phys. Rev. Research 3, 013264 (2021)

  8. Entropy bounds for multiparty device-independent cryptography

    Authors: Federico Grasselli, Gláucia Murta, Hermann Kampermann, Dagmar Bruß

    Abstract: Multiparty quantum cryptography based on distributed entanglement will find its natural application in the upcoming quantum networks. The security of many multipartite device-independent (DI) protocols, such as DI conference key agreement, relies on bounding the von Neumann entropy of the parties' outcomes conditioned on the eavesdropper's information, given the violation of a multipartite Bell in… ▽ More

    Submitted 18 December, 2020; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: Added discussion on the tightness of the entropy bounds, with comparison between analytical bounds and numerical estimations. Added explicit proof of the necessity of genuine multipartite entanglement for the secrecy of a party's outcome

    Journal ref: PRX Quantum 2, 010308 (2021)

  9. Quantum key distribution overcoming extreme noise: simultaneous subspace coding using high-dimensional entanglement

    Authors: Mirdit Doda, Marcus Huber, Gláucia Murta, Matej Pivoluska, Martin Plesch, Chrysoula Vlachou

    Abstract: High-dimensional entanglement promises to increase the information capacity of photons and is now routinely generated exploiting spatio-temporal degrees of freedom of single photons. A curious feature of these systems is the possibility to certify entanglement despite strong noise in the data. We show that it is also possible to exploit this noisy high-dimensional entanglement for quantum key dist… ▽ More

    Submitted 10 March, 2021; v1 submitted 27 April, 2020; originally announced April 2020.

    Journal ref: Phys. Rev. Applied 15, 034003 (2021)

  10. Quantum Conference Key Agreement: A Review

    Authors: Gláucia Murta, Federico Grasselli, Hermann Kampermann, Dagmar Bruß

    Abstract: Conference key agreement (CKA), or multipartite key distribution, is a cryptographic task where more than two parties wish to establish a common secret key. A composition of bipartite quantum key distribution protocols can accomplish this task. However, the existence of multipartite quantum correlations allows for new and potentially more efficient protocols, to be applied in future quantum networ… ▽ More

    Submitted 5 October, 2020; v1 submitted 23 March, 2020; originally announced March 2020.

    Comments: 15 pages, 4 figures. Contribution to special issue "Advancing quantum technologies - chances and challenges" of Advanced Quantum Technologies. v2: small changes, new citations included, close to the published version

  11. Key rates for quantum key distribution protocols with asymmetric noise

    Authors: Gláucia Murta, Filip Rozpędek, Jérémy Ribeiro, David Elkouss, Stephanie Wehner

    Abstract: We consider the asymptotic key rates achieved in the simplest quantum key distribution protocols, namely the BB84 and the six-state protocols, when non-uniform noise is present in the system. We first observe that higher qubit error rates do not necessarily imply lower key rates. Secondly, we consider protocols with advantage distillation and show that it can be advantageous to use the basis with… ▽ More

    Submitted 1 July, 2020; v1 submitted 17 February, 2020; originally announced February 2020.

    Comments: 11 pages, 7 figures. Typos corrected and references added. Close to the published version

    Journal ref: Phys. Rev. A 101, 062321 (2020)

  12. Verifiable Hybrid Secret Sharing With Few Qubits

    Authors: Victoria Lipinska, Gláucia Murta, Jérémy Ribeiro, Stephanie Wehner

    Abstract: We consider the task of sharing a secret quantum state in a quantum network in a verifiable way. We propose a protocol that achieves this task, while reducing the number of required qubits, as compared to the existing protocols. To achieve this, we combine classical encryption of the quantum secret with an existing verifiable quantum secret sharing scheme based on Calderbank-Shor-Steane quantum er… ▽ More

    Submitted 23 March, 2020; v1 submitted 21 November, 2019; originally announced November 2019.

    Comments: 12 + 5 pages, 3 figures

    Journal ref: Phys. Rev. A 101, 032332 (2020)

  13. Towards a realization of device-independent quantum key distribution

    Authors: Gláucia Murta, Suzanne B. van Dam, Jérémy Ribeiro, Ronald Hanson, Stephanie Wehner

    Abstract: In the implementation of device-independent quantum key distribution we are interested in maximizing the key rate, i.e. the number of key bits that can be obtained per signal, for a fixed security parameter. In the finite size regime, we furthermore also care about the minimum number of signals required before key can be obtained at all. Here, we perform a fully finite size analysis of device inde… ▽ More

    Submitted 24 July, 2019; v1 submitted 19 November, 2018; originally announced November 2018.

    Comments: 39+15 pages, 7 figures. Minor improvements in the main text; references added. Revised proofs of Theorems 2 and 3, correcting dependence on the conditioned state. Close to the published version

    Journal ref: Quantum Sci. Technol. 4 (2019) 035011

  14. Anonymous transmission in a noisy quantum network using the W state

    Authors: Victoria Lipinska, Gláucia Murta, Stephanie Wehner

    Abstract: We consider the task of anonymously transmitting a quantum message in a network. We present a protocol that accomplishes this task using the W state and we analyze its performance in a quantum network where some form of noise is present. We then compare the performance of our protocol with some of the existing protocols developed for the task of anonymous transmission. We show that, in many regime… ▽ More

    Submitted 23 November, 2018; v1 submitted 28 June, 2018; originally announced June 2018.

    Comments: 9 + 12 pages, 9 figures

    Journal ref: Phys. Rev. A 98, 052320 (2018)

  15. Fully device independent Conference Key Agreement

    Authors: Jérémy Ribeiro, Gláucia Murta, Stephanie Wehner

    Abstract: We present the first security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented {by any experimental setup} that is capable of performing Bell tests (specifically, we introduce the "Parity-CHSH" inequality), and security can in principle be obtained for any violation of the Parity-CHSH inequality. We use a direct c… ▽ More

    Submitted 19 February, 2022; v1 submitted 2 August, 2017; originally announced August 2017.

    Comments: 6+17 pages, 1 figure. v2: This update addresses the comment made in [arXiv:1906.01710]. v3: corrected typo in equations (A.65) and (11)

    Journal ref: Phys. Rev. A 97, 022307 (2018)

  16. arXiv:1704.04922  [pdf, other

    quant-ph

    Bounds on quantum nonlocality

    Authors: Gláucia Murta

    Abstract: One of the main goals in the study of quantum nonlocality is to determine the maximum violation achieved by quantum correlations in a Bell scenario. However, given a Bell inequality, there is no general algorithm to perform this task. As an intermediate step, the development of efficiently computable bounds has played an important role for the advance of the field. In this thesis we phrase the pro… ▽ More

    Submitted 17 April, 2017; originally announced April 2017.

    Comments: PhD Thesis, Departamento de Física, Universidade Federal de Minas Gerais, February 2016. (This Thesis was revised in March/2017 and Journal references were updated.)

  17. arXiv:1609.08487   

    quant-ph

    Fully general device-independence for two-party cryptography and position verification

    Authors: Jérémy Ribeiro, Gláucia Murta, Stephanie Wehner

    Abstract: Device-independent quantum cryptography allows security even if the devices used to execute the protocol are untrusted - whether this is due to unknown imperfections in the implementation, or because the adversary himself constructed them to subvert the security of the protocol. While device-independence has seen much attention in the domain of quantum key distribution, relatively little is known… ▽ More

    Submitted 7 December, 2020; v1 submitted 27 September, 2016; originally announced September 2016.

    Comments: There is an unresolved problem with an important step of the security proofs of the protocols in Lemma 25 of appendix A. 20+6 pages, 6 figures

  18. Genuine-multipartite entanglement criteria based on positive maps

    Authors: Fabien Clivaz, Marcus Huber, Ludovico Lami, Gláucia Murta

    Abstract: Positive maps applied to a subsystem of a bipartite quantum state constitute a central tool in characterising entanglement. In the multipartite case, however, the direct application of a positive but not completely positive map cannot distinguish if a state is genuinely multipartite entangled or just entangled across some bipartition. We thus generalise this bipartite concept to the multipartite s… ▽ More

    Submitted 15 August, 2017; v1 submitted 26 September, 2016; originally announced September 2016.

    Comments: 16+15 pages, 1 figure

    Journal ref: Journal of Mathematical Physics 58, 082201 (2017)

  19. On the tightness of correlation inequalities with no quantum violation

    Authors: Ravishankar Ramanathan, Marco Túlio Quintino, Ana Belén Sainz, Gláucia Murta, Remigiusz Augusiak

    Abstract: We study the faces of the set of quantum correlations, i.e., the Bell and noncontextuality inequalities without any quantum violation. First, we investigate the question whether every proper (tight) Bell inequality for two parties, other than the trivial ones from positivity, normalization and no-signaling can be violated by quantum correlations, i.e., whether the classical Bell polytope or the sm… ▽ More

    Submitted 19 July, 2016; originally announced July 2016.

    Comments: 16 pages

    Journal ref: Phys. Rev. A 95, 012139 (2017)

  20. Quantum bounds on multiplayer linear games and device-independent witness of genuine tripartite entanglement

    Authors: Gláucia Murta, Ravishankar Ramanathan, Natália Móller, Marcelo Terra Cunha

    Abstract: Here we study multiplayer linear games, a natural generalization of XOR games to multiple outcomes. We generalize a recently proposed efficiently computable bound, in terms of the norm of a game matrix, on the quantum value of 2-player games to linear games with $n$ players. As an example, we bound the quantum value of a generalization of the well-known CHSH game to $n$ players and $d$ outcomes. W… ▽ More

    Submitted 16 November, 2015; v1 submitted 30 October, 2015; originally announced October 2015.

    Comments: 7+8 pages

    Journal ref: Phys. Rev. A 93, 022305 (2016)

  21. Generalized XOR games with $d$ outcomes and the task of non-local computation

    Authors: Ravishankar Ramanathan, Remigiusz Augusiak, Gláucia Murta

    Abstract: A natural generalization of the binary XOR games to the class of XOR-d games with $d > 2$ outcomes is studied. We propose an algebraic bound to the quantum value of these games and use it to derive several interesting properties of these games. As an example, we re-derive in a simple manner a recently discovered bound on the quantum value of the CHSH-d game for prime $d$. It is shown that no total… ▽ More

    Submitted 9 March, 2016; v1 submitted 10 February, 2015; originally announced February 2015.

    Comments: 10 pages

    Journal ref: Phys. Rev. A 93, 022333 (2016)

  22. Bounds on quantum nonlocality via partial transposition

    Authors: Karol Horodecki, Gláucia Murta

    Abstract: We explore the link between two concepts: the level of violation of a Bell inequality by a quantum state and discrimination between two states by means of restricted classes of operations, such as local operations and classical communication (LOCC) and separable ones. For any bipartite Bell inequality, we show that its value on a given quantum state cannot exceed the classical bound by more than t… ▽ More

    Submitted 24 June, 2015; v1 submitted 25 July, 2014; originally announced July 2014.

    Comments: 5+4 pages, 1 figure. Theorem 1 extended to Bell inequalities with negative coefficients. Text slightly improved

    Journal ref: Phys. Rev. A 92, 010301 (2015)

  23. arXiv:1406.0995  [pdf, ps, other

    quant-ph cs.IT math.CO

    Characterising the Performance of XOR Games and the Shannon Capacity of Graphs

    Authors: Ravishankar Ramanathan, Alastair Kay, Gláucia Murta, Paweł Horodecki

    Abstract: In this paper we give a set of necessary and sufficient conditions such that quantum players of a two-party {\sc xor} game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the… ▽ More

    Submitted 17 June, 2014; v1 submitted 4 June, 2014; originally announced June 2014.

    Comments: 5 pages. Clarified proof of theorem 1, typos corrected

    Journal ref: Phys. Rev. Lett. 113, 240401 (2014)

  24. arXiv:1307.0156   

    quant-ph cs.CR

    Quantum nonlocality as the route for ever-lasting unconditionally secure bit commitment

    Authors: Gláucia Murta, Marcelo Terra Cunha, Adán Cabello

    Abstract: We present a bit commitment protocol based on quantum nonlocality that seems to bring ever-lasting unconditional security. Although security is not rigorously proved, physical arguments and numerical simulations support this conclusion. The key point is that the proof of the commitment is forced to become classical data uncorrelated with anything else. This allows us to circumvent previous impossi… ▽ More

    Submitted 8 April, 2015; v1 submitted 29 June, 2013; originally announced July 2013.

    Comments: This paper has been withdrawn by the authors due to an insecurity found in the protocol