Exploring Quantum Secret Sharing with the ZX Calculus Vladimir - - PowerPoint PPT Presentation

exploring quantum secret sharing with the zx calculus
SMART_READER_LITE
LIVE PREVIEW

Exploring Quantum Secret Sharing with the ZX Calculus Vladimir - - PowerPoint PPT Presentation

Introduction HBB protocols Graph State Protocols Exploring Quantum Secret Sharing with the ZX Calculus Vladimir Nikolaev Zamdzhiev Oriel College, University of Oxford 29 October 2013 Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret


slide-1
SLIDE 1

Introduction HBB protocols Graph State Protocols

Exploring Quantum Secret Sharing with the ZX Calculus

Vladimir Nikolaev Zamdzhiev

Oriel College, University of Oxford

29 October 2013

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-2
SLIDE 2

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Secret Sharing Motivation

Independently introduced in 1979 by Blakley [3] and Shamir [1] Main idea – a dealer wishes to share a secret between several players Secret is only accessible to players if they work together and denied otherwise Cryptographic problem which has been studied extensively

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-3
SLIDE 3

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Secret Sharing Motivation

Independently introduced in 1979 by Blakley [3] and Shamir [1] Main idea – a dealer wishes to share a secret between several players Secret is only accessible to players if they work together and denied otherwise Cryptographic problem which has been studied extensively Applications :

secure nuking of countries (or activation of weapons / bombs)

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-4
SLIDE 4

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Secret Sharing Motivation

Independently introduced in 1979 by Blakley [3] and Shamir [1] Main idea – a dealer wishes to share a secret between several players Secret is only accessible to players if they work together and denied otherwise Cryptographic problem which has been studied extensively Applications :

secure nuking of countries (or activation of weapons / bombs) joint access to a shared bank account

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-5
SLIDE 5

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Secret Sharing Motivation

Independently introduced in 1979 by Blakley [3] and Shamir [1] Main idea – a dealer wishes to share a secret between several players Secret is only accessible to players if they work together and denied otherwise Cryptographic problem which has been studied extensively Applications :

secure nuking of countries (or activation of weapons / bombs) joint access to a shared bank account guard commercial secrets

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-6
SLIDE 6

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Secret Sharing Example

Consider 3 people – Alice, Bob and Charlie. Alice wants to share a secret bit string s (e.g. 100101) between Bob and Charlie. Alice can do so by following these steps :

1 Alice generates a random bit string k (key) of the same length

(e.g. 111001)

2 Alice computes b := s ⊕ k (result 011100) 3 Alice sends b to Bob and k to Charlie 4 Neither Bob, nor Charlie has any information about the secret 5 If Bob and Charlie work together, they can compute the secret

by summing their bit strings

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-7
SLIDE 7

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Threshold Secret Sharing

A (k, n) Threshold Secret Sharing Scheme is described by : n players and a dealer Every set of k (or more) players working together must be able to reconstruct the secret Fewer than k players are denied some information about the secret If any set of fewer than k players gain no information about the secret, then the sharing scheme is called perfect

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-8
SLIDE 8

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Quantum Secret Sharing

Type of secret sharing, where quantum mechanical phenomena are used to achieve the goal Information to be shared can be either classical bit (s) or qubit (|s) We formally prove the correctness of two aspects of QSS protocols :

reconstruction of secret by authorized sets of players denial of secret to unauthorized sets of players

We do not consider security aspects like eavesdropping, cheating and other attacks (arguments don’t easily translate to ZX calculus)

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-9
SLIDE 9

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Threshold Quantum Secret Sharing

Three main types : CC(k, n) – share a classical secret over private channels CQ(k, n) – share a classical secret over public channels between dealer and players QQ(k, n) – share a quantum secret, private channel between players Since we ignore security, we also ignore difference between public and private channels

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-10
SLIDE 10

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Computational observations for T(Q)SS

For a (k, n) T(Q)SS we have : If k − 1 players cannot distinguish between two fixed secrets, independently from the actions of the rest of the players, then we establish the deniability property If k − 1 players cannot distinguish between any two secrets, independently from the actions of the rest of the players, then we establish perfect deniability That’s how we model the deniability phase using the ZX calculus

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-11
SLIDE 11

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

ZX Calculus Motivation

formally reason about Quantum Computation and Information use a graphical notation avoid Hillbert Space formalism

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-12
SLIDE 12

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

ZX Calculus syntax and semantics

= 1 1

  • = 1Q

=     1 1 1 1     = σQ2 = 00| + 11| = |00 + |11

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-13
SLIDE 13

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

ZX Calculus syntax and semantics

α =    |0m → |0n |1m → eiα|1n

  • thers → 0

α =    |+m → |+n |−m → eiα|−n

  • thers → 0

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-14
SLIDE 14

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

ZX Calculus syntax and semantics

= 1 √ 2 1 1 1 −1

  • = H

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-15
SLIDE 15

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

ZX Calculus syntax and semantics

Ψ1 = D1 and Ψ2 = D2 then Ψ1 Ψ2 = D1 ⊗ D2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-16
SLIDE 16

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

ZX Calculus syntax and semantics

Ψ1 Ψ2 = D1 ◦ D2 By following the above rules we can represent any pure state map f : Qm → Qn as a diagram in the ZX calculus [2].

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-17
SLIDE 17

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

CP construction

The ZX calculus as introduced so far has some limitations post-selecting measurement results leading to case distinction can’t model flow of classical information can’t do conditional unitary operations without case distinction We can avoid that by using the CP construction and working in CP(FHilb) instead of FHilb. doubles the size of diagrams with the same Hilbert space interpretation syntax and rewriting rules remain the same semantics extend straightforwardly

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-18
SLIDE 18

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

From FHilb to CP(FHilb)

FHilb : Ψ CP(FHilb) : Ψ Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-19
SLIDE 19

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Common Quantum States

Qn FHilb CP(FHilb) |0 |1

π π π

|+ |−

π π π

|00 + |11

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-20
SLIDE 20

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Common unconditional unitary operations

Qn FHilb CP(FHilb) Z

π π π

X

π π π

H Z ◦ X

π π π π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-21
SLIDE 21

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Common 2-qubit gates

Qn FHilb CP(FHilb) Z ⊗ X

π π π π π π

∧Z

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-22
SLIDE 22

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Classical data and operations

Zn

2

CP(FHilb) 1

π

n

i si

s ⊕ 1

π

s → (s, s, ..., s)

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-23
SLIDE 23

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Conditional Unitary Operations

Qn CP(FHilb) Z s X s

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-24
SLIDE 24

Introduction HBB protocols Graph State Protocols Quantum Secret Sharing ZX Calculus

Measuremens

Qn CP(FHilb) Z-measure X-measure Y-measure

π 2 π 2

Bell basis measurement

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-25
SLIDE 25

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

HBB protcols overview

In 1999, Hillery, Buzek and Berthiaume proposed the first quantum secret sharing protocols [4] Based on the GHZ state : (|000 + |111) Two protocols – CQ(2,2) and QQ(2,2) Straightforward generalisation to CQ(n,n) based on generalised GHZ state (|0n + |1n) [7]

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-26
SLIDE 26

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

State and Secret Distribution

In the distribution phase, the dealer prepares the (n+1)GHZ state and sends each player one qubit. The dealer also keeps one qubit for himself. Graphically, the quantum state and classical secret are given by : The classical secret is encrypted and shared in later steps, after a shared key has been established.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-27
SLIDE 27

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Protocol Description

1 The dealer and all players randomly choose a measurement

direction - either X or Y . We can depict this by assigning a boolean variable xi to each player and the dealer. xi = 1 iff player i − 1 has chosen Y for his measurement dirrection (x1 is the direction of the dealer)

2 Each player and the dealer publicly announce their

measurement directions

3 The players and the dealer restart the protocol if xi is odd,

i.e. there is an odd number of Y measurements. Otherwise, the protocol proceeds to the next step

4 The dealer measures his qubit in the selected direction 5 The dealer encrypts the classical bit S with the measurement

  • utcome. This is achived by adding modulo 2 the two bits.

6 The dealer sends the encrypted message to all players (player 1

will decrypt it, so we depict only this scenario)

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-28
SLIDE 28

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Protocol Description

7 Every player measures his qubit in the selected direction 8 All players send their measurement outcomes to player 1. 9 Player 1 sums all measurement outcomes (including his)

modulo 2.

10 Depending on the announced measurement directions, player 1

performs a negation on the result of the previous step. He performs a negation iff xi is divisible by 2, but not by 4.

11 Now player 1 has obtained the shared key and he uses it to

decrypt the bit he received from the dealer. This is done by adding modulo 2 the two bits.

12 Player 1 has the secret bit S Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-29
SLIDE 29

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Protocol Description in ZX Calculus

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-30
SLIDE 30

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Secret Reconstruction

Now we have to show that the secret can be reconstructed by the players Proof is on the next few slides

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-31
SLIDE 31

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) xiπ 2 x1π 2 x1π 2 x2π 2 x2π 2 xn+1π 2 xn+1π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-32
SLIDE 32

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) xiπ 2 xiπ 2 xiπ 2 Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-33
SLIDE 33

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

GB

=

xiπ 2 xiπ 2 xiπ 2

S1

=

xiπ 2 xiπ 2 xiπ 2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-34
SLIDE 34

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

B1

=

xiπ 2 xiπ 2 xiπ 2 xiπ 2

N,S1

=

xiπ

=

S2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-35
SLIDE 35

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Secret inaccessibility

Nothing to depict, because if one player is not collaborating, then he won’t announce a measurement direction and protocol stops.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-36
SLIDE 36

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

State and Secret Distribution

Quantum secret and a GHZ state

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-37
SLIDE 37

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Protocol Description

WLOG, we assume that the second player will receive the quantum secret.

1 The dealer measures his qubits in the Bell basis and sends two

classical bits (d1, d2) to player 2 to inform him of the measurement outcome

2 Player 1 measures his qubit in the X basis and sends a

classical bit (p1) to player 2 to inform him of the outcome

3 Player 2 performs the unitary correction Z p1⊕d1 ⊗ X d2 4 Player 2’s qubit is now in the state |S Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-38
SLIDE 38

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Protocol Description in the ZX Calculus

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-39
SLIDE 39

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Secret Reconstruction

Next, we have to show that the players can reconstruct the quantum secret, that is, the diagram is equal to the identity map.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-40
SLIDE 40

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-41
SLIDE 41

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-42
SLIDE 42

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

H

=

T,N

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-43
SLIDE 43

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-44
SLIDE 44

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

S2

=

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-45
SLIDE 45

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-46
SLIDE 46

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

H

=

S1,S2,N

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-47
SLIDE 47

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-48
SLIDE 48

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

H

=

S2,N

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-49
SLIDE 49

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2) Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-50
SLIDE 50

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Secret inaccessibility

We will show that player 2 is unable to reconstruct the state |S, when player 1 performs an X measurement on his qubit and does not inform player 2 of the outcome. This means, that one player cannot independently obtain the secret and thus this is an example

  • f a (2,2) QQ sharing scheme.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-51
SLIDE 51

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Ψ

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-52
SLIDE 52

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-53
SLIDE 53

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

S2

=

Ψ

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-54
SLIDE 54

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-55
SLIDE 55

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

S1

=

Ψ

B2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-56
SLIDE 56

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-57
SLIDE 57

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

S1

=

Ψ

H

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-58
SLIDE 58

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-59
SLIDE 59

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Secret inaccessibility

The last diagram reveals that, for any Ψ, the diagram cannot compute the identity function. This can be seen by plugging in states |+ and |−, which result in the same behaviour. Therefore, the secret is denied to the player.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-60
SLIDE 60

Introduction HBB protocols Graph State Protocols CQ(n,n) QQ(2,2)

Secret inaccessibility (not perfect)

The sharing scheme is not perfect however. We can take Ψ to be the diagram representing the actions of player 2 where he measures in the computational basis and then compares his result with one of the bits which the dealer has send him. Then, he can prepare the correct quantum state to perfectly distinguish between |0 or |1.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-61
SLIDE 61

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-62
SLIDE 62

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Graph State protcols overview

Introduced in 2008 by Markham and Sanders [6] Important class of QSS protocols Based on (extended) graph states Authors develop their own graphical formalism to reason about accessibility of information ZX Calculus is complete for stabilizer quantum mechanics and therefore graph states

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-63
SLIDE 63

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Graph States

Definition Given an undirected graph G = (V , E), with |V | = n, the graph state induced by G is the n-qubit state |G :=

  • e∈E

∧Ze|+n Therefore, any graph G = (V , E) gives rise to a graph state by :

1 Preparing the state |+n, where n is the number of vertices 2 Applying a ∧Z gate on qubits (i, j) iff (vi, vj) ∈ E Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-64
SLIDE 64

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Graph States in the ZX Calculus

Graph states are represented in the ZX calculus by

1 Drawing two green dots for each vertex and connecting each

green dot to an output box

2 For every edge (vi, vj) ∈ E connecting one of the green dots

representing vertex vi to one of the green dots representing vertex vj by a wire and putting a Hadamard gate on the wire. Then do the same for the remaining pair of dots.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-65
SLIDE 65

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Example : C4 graph state in ZX

Example The graph state induced by the cycle graph C4 is represented in the ZX calculus as :

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-66
SLIDE 66

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

CC(3,4) protocol

Based on the cycle graph C4 1 2 4 3

Figure: CC (3,4) graph

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-67
SLIDE 67

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

State and secret distribution

The dealer prepares the graph state induced by the graph. The secret is distributed, by performing controlled unitary Z operations

  • n each qubit of the graph state.

Dealer doesn’t do anything else for the remainder of the protcol.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-68
SLIDE 68

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Protocol Description

WLOG, we assume that the players who want to obtain the secret are players 1,2 and 3.

1 Players 1 and 3 measure in the computational basis 2 Player 2 measures his qubit in the X basis 3 Players 1 and 3 send their results to player 2 4 Player 2 sums all measurement results modulo 2 (including his

  • wn)

5 Player 2 now has the secret S Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-69
SLIDE 69

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Protocol Description in the ZX Calculus

Figure: CC (3,4) protcol

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-70
SLIDE 70

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Secret Reconstruction

We need to show that the previous diagram contains the identity function on the bit input

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-71
SLIDE 71

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-72
SLIDE 72

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-73
SLIDE 73

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-74
SLIDE 74

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-75
SLIDE 75

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

C

=

T

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-76
SLIDE 76

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-77
SLIDE 77

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

GB

=

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-78
SLIDE 78

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

S2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-79
SLIDE 79

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Secret inaccessibility

The secret is denied to any set of two players. We use similar arguments as in the previous protocols - two players will measure their qubits without sharing the results with the others. We will see that no information is recovered by the players, which completes the proof of correctness.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-80
SLIDE 80

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

We consider only one case - the two collaborating players are

  • neighbours. The other case is similar.

Ψ

S1

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-81
SLIDE 81

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

Ψ

C,S1

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-82
SLIDE 82

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

Ψ

S2

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-83
SLIDE 83

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1,I

=

Ψ

H,S1

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-84
SLIDE 84

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-85
SLIDE 85

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

QQ(n,n) protocol

Based on the following graph 2 3 n 1

Figure: QQ (n,n) graph

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-86
SLIDE 86

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

State and Secret Distribution

The dealer prepares the mentioned graph state. Then, the dealer does a Bell basis measurement on the input qubit |S and the qubit

  • 0. Depending on the measurement outcome, the dealer then

applies unitary corrections to the remaining qubits. Sends each player one particle and doesn’t participate further.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-87
SLIDE 87

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Protocol Description

1 Players 2, 3, ..., n measure in the computational basis 2 Players 2, 3, ..., n send their measurement results xi to player 1 3 Player 1 performs the unitary correction Z

xi ◦ H

4 Player 1 now has the quantum secret |S Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-88
SLIDE 88

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1,S2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-89
SLIDE 89

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-90
SLIDE 90

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

C

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-91
SLIDE 91

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-92
SLIDE 92

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

C,S1

=

H,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-93
SLIDE 93

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-94
SLIDE 94

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

N,C

=

U

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-95
SLIDE 95

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-96
SLIDE 96

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-97
SLIDE 97

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-98
SLIDE 98

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

GB

=

B1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-99
SLIDE 99

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-100
SLIDE 100

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1,N

=

S2,I

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-101
SLIDE 101

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Secret inaccessibility

There are two cases to consider for proving secret inacessibility – when player 1 is not collaborating or when some other player is not

  • collaborating. We will only consider the first case.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-102
SLIDE 102

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

First case - player 1 is not collaborating. Let’s see what happens when he measures his qubit, but does not share the result with anybody

Ψ

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-103
SLIDE 103

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-104
SLIDE 104

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

Ψ

S2

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-105
SLIDE 105

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

Ψ

H

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-106
SLIDE 106

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1,S2,C

=

Ψ

S2

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-107
SLIDE 107

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

Ψ

C

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-108
SLIDE 108

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

Ψ

B2

=

Ψ

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-109
SLIDE 109

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Secret inaccessibility

We can see that, in both cases, the output would be the same for states |0 and |1. Therefore, this is an example of a quantum secret sharing scheme. However, the QSS scheme is not perfect, because the players are able to perfectly discriminate between states |+ and |− as noted in the erratum which the authors published afterwards [5]. By using similar arguments to the HBB QQ protcol, for a good choice of Ψ, we can show how these two states are teleported.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-110
SLIDE 110

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Long derivations

There are even longer derivations. Consider one case of the CC(3,5) protocol

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-111
SLIDE 111

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

S1,T

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-112
SLIDE 112

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-113
SLIDE 113

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

T

=

π 2 π 2 π 2 π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-114
SLIDE 114

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-115
SLIDE 115

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

B2

=

π 2 π 2 π 2 π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-116
SLIDE 116

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-117
SLIDE 117

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

π 2 π 2 π 2 π 2

B2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-118
SLIDE 118

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-119
SLIDE 119

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

π 2 π 2 π 2 π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-120
SLIDE 120

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-121
SLIDE 121

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

B2

=

π 2 π 2 π 2 π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-122
SLIDE 122

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-123
SLIDE 123

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

C

=

π 2 π 2 π 2 π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-124
SLIDE 124

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-125
SLIDE 125

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

B2

=

π 2 π 2 π 2 π 2

B2

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-126
SLIDE 126

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-127
SLIDE 127

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

T,C

=

π 2 π 2 π 2 π 2

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-128
SLIDE 128

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2 π 2

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-129
SLIDE 129

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

π 2 π 2 π 2 π 2

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-130
SLIDE 130

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

  • π

2 π 2 π 2 π 2 π 2

  • π

2

π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-131
SLIDE 131

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

L

=

π 2 π 2 π 2

π

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-132
SLIDE 132

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π 2 π 2 π 2

π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-133
SLIDE 133

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

C,S1

=

  • π

2

π

π 2

  • π

2

π π

S1,L

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-134
SLIDE 134

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-135
SLIDE 135

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

C

=

π π π

S1,K1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-136
SLIDE 136

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-137
SLIDE 137

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

π π π

C

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-138
SLIDE 138

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-139
SLIDE 139

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

B2

=

π π π

C

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-140
SLIDE 140

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-141
SLIDE 141

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

π π π

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-142
SLIDE 142

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-143
SLIDE 143

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

B2

=

π π π

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-144
SLIDE 144

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-145
SLIDE 145

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

π π π

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-146
SLIDE 146

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-147
SLIDE 147

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

B2

=

π π π

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-148
SLIDE 148

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-149
SLIDE 149

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

T

=

π π π

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-150
SLIDE 150

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-151
SLIDE 151

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

GB

=

π π π

B1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-152
SLIDE 152

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-153
SLIDE 153

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

S1

=

π π π

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-154
SLIDE 154

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-155
SLIDE 155

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

π π π

C,S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-156
SLIDE 156

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

π π π

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-157
SLIDE 157

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

H

=

π π

T

=

π

R

=

π π

S1

=

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-158
SLIDE 158

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

I coudln’t do one protocol

I couldn’t do the QQ(3,5) protocol, because the diagram is too large and complicated. However, we do know that it is possible to rewrite it to the identity. Here’s how it looks (first case) :

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-159
SLIDE 159

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-160
SLIDE 160

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Conclusions

need software support (Quantomatic) for larger diagrams

!-boxes necessary to express some of the protocols in Quantomatic possible extension necessary if work to be done using Cn and

  • ther recursive graph states within Quantomatic

protocols need to be expressed very formally and precisely (even tiny details must be considered) proving security does not seem to be straightforward rigorous approach identified errors in QQ(n,n) approach easily

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-161
SLIDE 161

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

  • A. Shamir.

How to share a secret. Communications of the ACM, 26:313–317, 1979.

  • B. Coecke and R. Duncan.

Interacting quantum observables: categorical algebra and diagrammatics. New Journal of Physics, 13(043016), 2011.

  • G. R. Blakley.

Safeguarding cryptographic keys. In AFIPS National Computer Conference, pages 313–317, 1979.

  • M. Hillery, V. Buzek, and A. Berthiaume.

Quantum Secret Sharing. Physical Review A, 59:1829–1834, 1999.

  • B. C. Sanders and D. Markham.

Erratum: Graph states for quantum secret sharing.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus

slide-162
SLIDE 162

Introduction HBB protocols Graph State Protocols CC(3,4) QQ(n,n) Other thoughts

Physical Review A, 78(042309), 2008.

  • B. C. Sanders and D. Markham.

Graph States for Quantum Secret Sharing. Physical Review A, 78(042309), 2008.

  • L. Xiao, G.L. Long, F-G. Deng, and J-W Pan.

Physical Review A, 69(052307), 2004.

Vladimir Nikolaev Zamdzhiev Exploring Quantum Secret Sharing with the ZX Calculus