Tamper Detection against Unitary Operators

by   Naresh Goud Boddu, et al.

We consider (Enc, Dec) schemes which are used to encode a classical/quantum message m and derive an n-qubit quantum codeword ψ_m. The quantum codeword ψ_m can adversarially tamper via a unitary U ∈𝒰 from some known tampering unitary family 𝒰, resulting in U ψ_m U^†. Firstly, we initiate the general study of quantum tamper detection codes, which must detect that tampering occurred with high probability. In case there was no tampering, we would like to output the message m with a probability of 1. We show that quantum tamper detection codes exist for both classical messages and quantum messages for any family of unitaries 𝒰, such that |𝒰| < 2^2^α n for some known constant α∈ (0,1) and all the unitaries satisfy one additional condition : * Far from Identity : For each U ∈𝒰, we require that its modulus of trace value isn't too much i.e. |Trace(U)| ≤ϕ N, where N=2^n. Quantum tamper-detection codes are quantum generalizations of classical tamper detection codes studied by Jafargholi et al. <cit.>. Additionally for classical message m, if we must either output message m or detect that tampering occurred and output ⊥ with high probability, we show that it is possible without the restriction of Far from Identity condition for any family of unitaries 𝒰, such that |𝒰 | < 2^2^α n. We also provide efficient (Enc, Dec) schemes when the family of tampering unitaries are from Pauli group 𝒫_n, which can be thought of as a quantum version of the algebraic manipulation detection (AMD) codes of Cramer et al. <cit.>.


page 1

page 2

page 3

page 4


Hermitian dual-containing constacyclic BCH codes and related quantum codes of length q^2m-1/q+1

In this paper, we study a family of constacyclic BCH codes over 𝔽_q^2 of...

Nonbinary Error-Detecting Hybrid Codes

Hybrid codes simultaneously encode both quantum and classical informatio...

Quantum version of the k-NN classifier based on a quantum sorting algorithm

In this work we introduce a quantum sorting algorithm with adaptable req...

No-go for quantum seals

We introduce the concept of a quantum "seal" and investigate its feasibi...

Quantum LDPC codes with Ω(√(n)log^kn) distance, for any k

In this work we construct quantum LDPC codes of distance √(n)log^k n for...

Security of Quantum Key Distribution from Attacker's View

In 2005, trace distance between an ideal quantum state to be distributed...

Quantum Implementation of Risk Analysis-relevant Copulas

Modern quantitative risk management relies on an adequate modeling of th...

Please sign up or login with your details

Forgot password? Click here to reset