Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by (Link opens in a new window)
Abstract
1 Introduction
With the rapid advancement of quantum technologies and the increasing deployment of quantum communication systems, new protocols for the secure transmission of quantum information have been proposed. While quantum key distribution (QKD) [1‐4] is the most widely known application—using quantum systems to establish shared classical keys for classical encryption—quantum cryptography provides a broader set of protocols designed to protect quantum data itself. These include quantum encryption [5‐9], quantum secret sharing [10, 11], and quantum message authentication [12‐14].
1.1 Quantum message (state) authentication
Message authentication is a fundamental task in cryptography that enables a receiver to verify whether a message has been tampered with during transmission, and whether it originates from the claimed sender. By enabling tamper detection and origin verification, quantum authentication serves as a critical building block for advanced cryptographic protocols such as quantum one-time programs [15] and secure multiparty quantum computation [16‐18].
Advertisement
A quantum authentication scheme works with a classical symmetric key and consists of two keyed procedures: encoding (or encryption) and decoding (or decryption). The sender encodes the quantum message using the key. The recipient gets a quantum state and decodes it using the same key; attempts to forge or manipulate the quantum message are detected with high probability. The first Quantum Authentication Scheme (QAS) was introduced by Barnum et al. [12], where they also provided security definitions. One of the key results of their work was that any QAS must encrypt the quantum message. Their construction relied on purity-testing codes derived from quantum error-correcting codes (QECCs). It was later shown that such purity-testing codes can also satisfy universal composability [19].
The original security definition has since been strengthened by more robust proposals [19‐21]. It was shown that partial or even complete key reuse is possible, depending on the amount of key leakage [20, 22, 23]. A variety of QAS constructions have been proposed, based on polynomial codes [14, 16], Clifford codes [14], threshold codes [24], and trap codes [13, 15].
1.2 Trap code-based quantum authentication
In this paper, we focus on trap code-based quantum authentication, first introduced in [15] and later refined with a more efficient security proof in [13]. The main idea behind trap codes is to insert dummy states—referred to as traps—into the quantum message (which has already been encoded using a QECC), and then apply a secret permutation and Quantum One-Time Pad encryption. The traps are used to detect any tampering by an adversary.
1.3 Contribution
All of the quantum authentication schemes referred to above are designed for Discrete-Variable (DV) quantum states. In contrast, Continuous-Variable (CV) quantum message authentication remains relatively unexplored. CV systems are particularly attractive for practical implementations due to their compatibility with existing optical communication infrastructure.
Advertisement
In this work, we introduce the first quantum authentication scheme for CV quantum states. Our construction is an adaptation of the DV trap code-based QAS proposed by Broadbent, Gutoski, and Stebila [15]. Our security proof follows the proof technique of Broadbent and Wainewright [13]. While our construction and security proof contain no real surprises, the differences between DV and CV lead to several nontrivial features, e.g. the necessity to allow a small probability of error in the verification step; fine tuning scheme parameters in order to obtain properly matched step-like functions; a CV analogue of the Pauli twirl.
Our contributions are:
-
We propose the first quantum authentication scheme for CV states. In contrast to existing DV schemes, our construction allows for a variable number of trap states.
-
We provide a security proof for the proposed scheme, adapting and extending techniques from the DV setting to the CV setting. Imperfections due to the finite squeezing and the finite width of the gaussian QOTP distribution are taken into account.
-
We introduce the notion of a CV Twirl, an analogue to the Pauli Twirl.
2 Preliminaries
We begin by presenting the notation and provide descriptions of the Continuous-Variable concepts. We detail the correspondence between the DV and CV settings in the context of our authentication scheme. In particular, we explain how the main components appear in the DV framework, how they are adapted to the CV framework, the differences between the two, and why the CV counterparts perform a similar function. Finally, we provide definitions and useful lemmas.
2.1 Notation and CV preliminaries
We use standard notation from quantum information theory. Quantum states are represented by density operators (positive semi-definite, trace-one operators) acting on Hilbert spaces, and we write them as \(\rho , \sigma \), etc., with subscripts indicating associated registers. The identity operator is denoted by \(\mathbbm {1}\), and the partial trace over a subsystem \(A\) is \(\textrm{Tr}\,_A\). We write \(\Vert A\Vert _1\) for the 1-norm, and \(\Vert \rho -\sigma \Vert _\textrm{tr}=\) \( \frac{1}{2}\Vert \rho - \sigma \Vert _1\) is the trace distance between two quantum states. Throughout, we consider bosonic modes with associated infinite-dimensional Hilbert spaces. Each mode is equipped with canonical quadrature operators \(\hat{x}, \hat{p}\) corresponding to position and momentum observables, satisfying the commutation relation \([\hat{x}, \hat{p}] = i\). The annihilation and creation operators are defined as \(\hat{a} = \tfrac{1}{\sqrt{2}}(\hat{x}+ i\hat{p}), \quad \hat{a}^\dagger = \tfrac{1}{\sqrt{2}}(\hat{x}- i\hat{p})\). The electromagnetic field in vacuum can be decomposed into plane waves. Plane waves with different parameters (direction, wavelength, polarization) are called modes. Each mode has its own creation/annihilation operators as defined above, which change the number of photons in the mode. The non-commuting observables \(\hat{x}\), \(\hat{p}\) represent the mode’s quadratures; a quadrature is a particular combination of the photon number n and the phase \(\varphi \) of the oscillation, such as \(x=\sqrt{n}\cos \varphi \) and \(p=\sqrt{n} \sin \varphi \). Quadratures are easy to measure experimentally with cheap hardware at room temperature.
The Wigner function provides a quasiprobability representation of a quantum state in phase space. For a single-mode density operator \(\hat{\rho }\), the Wigner function is given by \( W(x,p) = \frac{1}{\pi } \int _{-\infty }^{\infty } \langle x+y \vert \hat{\rho } \vert x-y \rangle \, e^{-2 i p y} \, \textrm{d}y \), where \(| x \rangle \) denotes the eigenstate of the quadrature operator \(\hat{x}\). The marginals of W(x, p) yield the probability distributions of quadrature measurements. For instance, for the vacuum state \(\rho = |0 \rangle \langle 0 |\), the Wigner function can be evaluated explicitly as \(W_{\textrm{vac}}(x,p) = \frac{1}{\pi } \exp \!\left( -x^{2}-p^{2}\right) \). This is a Gaussian centered at the origin, with variances \(\textrm{Var}(\hat{x}) = \textrm{Var}(\hat{p}) = \tfrac{1}{2}.\) The corresponding fluctuations represent the fundamental shot noise of the vacuum, which sets the baseline noise floor in continuous-variable systems. More generally, a single-mode Gaussian state has a Wigner function of the form \(W(x,p)= \frac{1}{2\pi \sqrt{\det K}}\exp -\frac{1}{2}(x-x_0,p-p_0)K^{-1}{x-x_0\atopwithdelims ()p-p_0}\), where K is the \(2\times 2\) covariance matrix. For N modes, this generalizes to quadrature values \((x_1,\ldots ,x_N)\), \((p_1,\ldots ,p_N)\), and the covariance is a \(2N\times 2N\) matrix.
A coherent state is a shifted version of the vacuum state. For \(z \in \mathbb {C}\), the coherent state \(| z \rangle \) is defined as the eigenstate of \(\hat{a}\) with eigenvalue z: \(\hat{a} | z \rangle = z | z \rangle \). Coherent states have the minimum possible combined uncertainty in the quadratures \(\hat{x}\) and \(\hat{p}\) and their Wigner function is Gaussian centered at \((\textrm{Re}\,{z}, \textrm{Im}\,{z})\sqrt{2}\). The light produced by a laser is well described by a coherent state. Coherent states form an overcomplete basis of the Hilbert space, \(\int \textrm{d}^{2} z\; | z \rangle \langle z |=\pi \mathbbm {1}\). They can be represented as a displacement of th evacuum: \(| z \rangle = D(z)| 0 \rangle \). The displacement operator is given by \(D(\beta ) = \exp (\beta \hat{a}^\dagger - \bar{\beta } \hat{a})\). The set \(\{D(\beta )\}_{\beta \in \mathbb {C}}\) is a basis for the unitary operators [25] and forms a unitary representation of the Weyl-Heisenberg group. The displacement operators play the same role as Pauli operators in DV systems. Quantum One-Time Pad (QOTP) encryption for CV is achieved by applying a secret displacement, chosen from a very wide almost-uniform distribution [26].
The single-mode squeezing operator is given by \(S(r) = \exp \!\left[ -\tfrac{r}{2}(\hat{a}^{2} - \hat{a}^{\dagger 2})\right] \), \(r \in \mathbb {R}\). We define \(| X \rangle = S(r)| 0 \rangle \), which is squeezed in the x-quadrature, and \(| P \rangle = S(-r)| 0 \rangle \), which is squeezed in the p-quadrature. Their Wigner functions are elliptic Gaussians, with variances \(e^{-r}\) and \(e^{r}\) in the respective quadratures. As \(r \rightarrow \infty \), the states \(S(r)| 0 \rangle \) and \(S(-r)| 0 \rangle \) go to the quadrature eigenstates \(| x=0 \rangle \) and \(| p=0 \rangle \).
A two-mode maximally entangled state is created by mixing position and momentum eigenstates \(| p=p_0 \rangle \) and \(| x=x_0 \rangle \) together using a balanced beamsplitter. The two-mode state before the mixing is Gaussian with shift1\(s_0=(0,p_0,x_0,0)^T\) and covariance matrix \(K=\textrm{Diag}(e^r, e^{-r},e^{-r},e^r)\), where it is understood that we are taking the limit \(r\rightarrow \infty \). The action of the beamsplitter is represented as \(B=\frac{1}{\sqrt{2}}{\phantom {-}1\; 1\atopwithdelims ()-1\; 1}\). After the mixing, the shift is \(Bs_0=\frac{1}{\sqrt{2}}(x_0, p_0, x_0, -p_0 )^{T}\) and the covariance is \(B K B^T= {\phantom {-s}\mathbbm {1}\cosh r\;\;\;\; -\sigma _z \sinh r \atopwithdelims ()-\sigma _z \sinh r\;\;\;\; \mathbbm {1}\cosh r}\). The single-mode marginals have thermal distribution, but the x-quadratures of the two modes are perfectly correlated and the p-quadrature are anti-correlated. We will denote the maximally entangled state with zero displacement (known as the ‘two-mode squeezed vacuum’) as \(| \mathrm EPR \rangle \).
In DV, the two-qubit Bell basis is generated from one Bell state by QOTP-ing one side, i.e. acting with Pauli matrices on one of the two qubits. In CV this structure is also present, albeit only in the limit \(r\rightarrow \infty \). If we act with displacement operator \(D(u+iv)\) on the first mode of the above-mentioned EPR state, the covariance is unaffected and the shift changes to \(\frac{1}{\sqrt{2}}(x_0+2u, p_0+2v, x_0, -p_0 )^T\). In the basis of the original ‘unmixed’ modes, this corresponds to \((u,p_0+v,x_0+u,v)^T\). In the \(r\rightarrow \infty \) limit, the x-displacement in the first unmixed mode (over u) is hardly noticeable because of the \(e^r\) width in that direction. Similarly the p-displacement in the 2nd unmixed mode is hardly noticeable. Effectively, \(| x=x_0 \rangle \) has been mapped to \(| x= x_0+u \rangle \) and \(| p=p_0 \rangle \) to \(| p=p_0+v \rangle \). Thus the whole x-basis is spanned in one of the modes and the whole p-basis in the other mode. From \(\int \!\textrm{d}x\; | x \rangle \langle x |=\mathbbm {1}\) and \(\int \!\textrm{d}p\; | p \rangle \langle p |=\mathbbm {1}\) it follows that \(\int \!\textrm{d}^2 z\; D(z)| \mathrm EPR \rangle \langle \mathrm EPR |D^{\dag }(z)=\mathbbm {1}\).
A CV Quantum Error Correcting Code (CV-QECC) is called an \([[n, 1, d]]\) code if it encodes one mode to n modes and is capable of correcting arbitrarily large displacements in up to \(t = \lfloor (d-1)/2 \rfloor \) out of n modes.
2.2 Security definitions and useful lemmas
Lemma 2.1
(See e.g. [27]) The displacement operation D satisfies the property
$$\begin{aligned} D(\beta ) D(\gamma ) = e^{i\, \textrm{Im}\,(\beta \bar{\gamma })} D(\beta + \gamma ). \end{aligned}$$
(1)
We use the definition of a quantum authentication scheme given by Broadbent et al.[13], but with a small modification: we allow for a small probability that a decoding error occurs.
Definition 2.2
(Quantum message authentication scheme) A quantum authentication scheme (QAS) is a polynomial-time set of encryption and decryption channels \(\{\mathcal {E}_k^{M \rightarrow C}, \mathcal {D}_k^{C \rightarrow MF}) \mid k \in \mathcal {K} \}\) where \(\mathcal {K}\) is the set of possible keys, M is the input system, C is the encrypted system, and F is a flag system indicating either acceptance \(| acc \rangle \) or rejection \(| rej \rangle \) such thatwhere \(\varepsilon _\textrm{dec}\) is a small decoding error probability.
$$\begin{aligned} \forall _{\rho _M}\quad \Big \Vert (\mathcal {D}_k \circ \mathcal {E}_k)(\rho _M) - \rho _M \otimes | \textrm{acc} \rangle \langle \textrm{acc} |_F\Big \Vert _\textrm{tr} \le \varepsilon _\textrm{dec}, \end{aligned}$$
(2)
We allow the message register M to be entangled with a reference system R that belongs to the adversary. The input to the scheme is expressed as a joint quantum state \(\rho _{MR}\).
The adversary applies a joint unitary \(U_{CR}\) on the encoded message and the reference system. For a fixed key k, the corresponding real-world quantum channel is defined asThe security definition relies on comparing this real-world channel with an idealized simulator which has access only to the ideal functionality. The ideal functionality either accepts the message by outputting message register M, or rejects it by outputting a fixed dummy state \(\Omega _M\). The simulator may also modify the reference system R. The idealized process can be expressed as ideal channel \(\mathcal {F}\),where for each attack \(U_{CR}\) there exists two CP maps \(\mathcal {U}_R^{\textrm{acc}}\) and \(\mathcal {U}_R^{\textrm{rej}}\) acting only on the reference system R, satisfying \(\mathcal {U}_R^{\textrm{acc}} + \mathcal {U}_R^{\textrm{rej}} = \mathbbm {1}_R\).
$$\begin{aligned} \mathcal {C}_k^{MR \rightarrow MRF} :\quad \rho _{MR} \mapsto (\mathcal {D}_k \otimes \mathbbm {1}_R) \left( U_{CR}\; (\mathcal {E}_k \otimes \mathbbm {1}_R)(\rho _{MR})\; U_{CR}^\dagger \right) . \end{aligned}$$
(3)
$$\begin{aligned} \mathcal {F}^{MR \rightarrow MRF}: \quad&\rho _{MR} \mapsto&(\mathbbm {1}_M \otimes \mathcal {U}_R^{\textrm{acc}}) (\rho _{MR}) \otimes | \textrm{acc} \rangle \langle \textrm{acc} | \nonumber \\ & + \Omega _M \otimes \textrm{tr}\,_M\big [(\mathbbm {1}_M \otimes \mathcal {U}_R^{\textrm{rej}})(\rho _{MR}) \big ] \otimes | \textrm{rej} \rangle \langle \textrm{rej} |, \end{aligned}$$
(4)
Definition 2.3
(Security of quantum message authentication[13]) Let \(\{(\mathcal {E}_k^{M \rightarrow C}, \mathcal {D}_k^{C \rightarrow MF}) \mid k \in \mathcal {K}\}\) be a quantum message authentication scheme. The scheme is \(\eta \)-secure if for all attacks there exists a simulator \(\mathcal {F}\) such thatwhere the simulator has access only to the ideal functionality of the scheme.
$$\begin{aligned} \forall \rho _{MR} \quad \quad \Big \Vert \frac{1}{|\mathcal {K}|} \sum _{k\in \mathcal {K}}\mathcal {C}_k(\rho _{MR}) - \mathcal {F}(\rho _{MR}) \Big \Vert _\textrm{tr} \le \eta , \end{aligned}$$
(5)
3 Trap code CV quantum authentication scheme
We construct our CV quantum authentication scheme by adapting the trap code-based DV construction of Broadbent et al. [15] to CV quantum states. The encryption process begins with encoding the message modes using a quantum error-correcting code (QECC). Subsequently, two sets of trap modes are appended. The entire set of modes is permuted and then encrypted using a CV quantum one-time pad. The decoding process reverses the encoding steps: the received state is first decrypted and de-permuted, after which the integrity of the trap modes is verified. If the trap modes are intact, the message modes are decoded using the QECC, and ‘accept’ is flagged. If the trap modes are not intact, a ‘reject’ is flagged, the message state is discarded (traced out), and a dummy message is output instead.
In our QOTP construction we differ from [26], as we use a wide complex Gaussian instead of the uniform distribution on a finite disk. This has the advantage that, in the limit of infinite width, the encryption yields a thermal state, which is known to be the maximally mixed CV state.
3.1 From DV to CV: basic replacements
We briefly summarize how the main building blocks of DV authentication are replaced in the CV setting.
Qubit \(\rightarrow \) mode. Instead of working with a qubit spin state, CV systems encode information in the quadratures (\(\hat{x},\hat{p}\)) of a mode. Note that a quadrature measurement is always noisy due to the shot noise.
Bell state \(\rightarrow \) Two-mode squeezed vacuum (TMSV). The security proof in [13] uses Bell states to mimic the effect of ideal encryption. One half serves as the cipherstate, while the other half stays with the simulator for verification. We replace each Bell state by the TMSV.
Pauli basis \(\rightarrow \) displacements. In [13] the attack is written as a unitary acting on the encoded state and the attacker’s auxiliary state; this unitary is decomposed in the Pauli basis. Analogously, we use the displacement basis.
Spin traps \(\rightarrow \) squeezed states. In DV trap schemes, the traps are qubits prepared in a known state, and for verification they need to be measured in the correct basis. In CV, this becomes squeezed states. The verification is a homodyne measurement in the correct direction; the squeezing reduces the shot noise, so that the verification is more precise than for a coherent state.
3.2 The scheme
Encoding
The encoding process, denoted by \(\mathcal {E}^{M \rightarrow C}_{k}\), takes as input the single-mode message state \(\rho _{M}\). A CV QECC with parameters [[n, 1, d]] is applied to \(\rho _M\), encoding it to \(\textrm{Enc}(\rho _M)\) which consists of n modes. The QECC is able to correct displacements in \(\le t\) modes, where \(d = 2t +1\). After encoding, z states squeezed in the x-quadrature and z states squeezed in the p-quadrature are appended to the encoded message, forming a system of \(n + 2z\) modes. For proof-technical reasons we set \(2z>n\).These squeezed states are denoted as \(| X \rangle \) and \(| P \rangle \), respectively, and act as traps. They are centered on zero and have squeezing parameter r. The entire set of modes is then permuted according to a secret key \(k_1\). Finally, a QOTP is applied according to a secret key \(k_2\in {\mathbb C}^{n+2z}\) drawn from a Gaussian distribution with variance \(\Delta ^{2} \gg e^{r}\). The \(\Delta \) is a parameter of the scheme. We write \(k=(k_{1},k_{2})\). The output Hilbert space has \(n+2z\) modes.
The QAS encoding is expressed as:where \(\pi _{k_1}\) is the permutation and \(D_{k_2}\) is the QOTP displacement operator.
$$\begin{aligned} \mathcal {E}^{M \rightarrow C}_{k} : \rho _M \mapsto \rho _C\quad \quad \rho _C=D_{k_2} \pi _{k_1} \Big ( \text {Enc}(\rho _M) \otimes | X \rangle \langle X |^{\otimes z} \otimes | P \rangle \langle P |^{\otimes z} \Big ) \pi _{k_1}^\dagger D_{k_2}^{\dagger }, \end{aligned}$$
(6)
Decoding
The decoding \(\mathcal {D}^{C \rightarrow MF}_{k}\) begins by applying the inverse displacement \(D_{k_2}^{\dagger }\) and inverse permutation \(\pi _{k_1}^{\dagger }\) to the received cipherstate. The last 2z modes, corresponding to appended squeezed trap states, are then measured using homodyne detection. The measurement outcomes are denoted as \((x_i)_{i=1}^z\) and \((p_i)_{i=1}^z\). Ideally we would like to verify if the displacement caused to a trap mode exceeds some parameter \(\varepsilon \). However, because of the finite width \(e^{-r/2}\) of the squeezed state we cannot do an exact verification. In order to obtain enough confidence that \(\varepsilon \) is not exceeded, we test with a threshold \(\varepsilon '\), where \(\varepsilon '<\varepsilon \). We define the following condition for acceptance:In order to keep the decoding error probability (see Eq.10 below) small, the values of r and \(\varepsilon '\) are tuned such that \(\varepsilon '> e^{-r/2}\).
$$\begin{aligned} \forall _{i \in \{1, \dots , z\}} \quad |x_i| \le \varepsilon ' \;\wedge \; |p_i| \le \varepsilon '. \end{aligned}$$
(7)
In case of Accept, QECC-decoding Dec\(: \rho _C\rightarrow \rho _M\) is applied to the first n modes, and a flag \(| \text {acc} \rangle \langle \text {acc} |\) is appended. If any trap state fails the condition, the message system M is traced out, and a fixed dummy state \(\Omega _M\) is output instead. In this case, the flag \(| \text {rej} \rangle \langle \text {rej} |\) is appended.
We define a POVM V that acts on the trap space and has outcomes \(\{\text {acc}, \text {rej}\}\). The POVM elements are given bywhere \(| x \rangle \) is an x-quadrature eigenstate and \(| p \rangle \) is a p-quadrature eigenstate. The decoding process is expressed as follows,We briefly show that our scheme satisfies Def. 2.2 with a small decoding error probability \(\varepsilon _\textrm{dec}\). If there is no attack, each trap state has the following probability of passing the verification: \(\int _{-\varepsilon '}^{\varepsilon '} \! \textrm{d}x\; (2\pi e^{-r})^{-1/2} \exp (-\frac{x^2}{2e^{-r}})\) \(=\textrm{Erf}\frac{\varepsilon '}{e^{-r/2}\sqrt{2}}\). ThenWith the parameter tuning \(e^{-r/2}\ll \varepsilon '\), the above expression is close to 1. Using the inequalities \(\textrm{Erfc} (x)\le e^{-x^2}\) and \((1-x)^a \ge 1-ax\) we get \(\varepsilon _\textrm{dec} \le 2z \exp [-\frac{1}{2}\frac{(\varepsilon ')^2}{e^{-r}}]\).
$$\begin{aligned} V^{\text {acc}}_{\varepsilon '} = \mathbbm {1}^{\otimes n} \otimes \Bigg [ \int _{-\varepsilon '}^{\varepsilon '}\!\! \textrm{d}x \, | x \rangle \langle x | \Bigg ]^{\otimes z} \otimes \Bigg [ \int _{-\varepsilon '}^{\varepsilon '}\!\! \textrm{d}p \, | p \rangle \langle p | \Bigg ]^{\otimes z}, \quad \quad V^\textrm{rej}_{\varepsilon '}=\mathbbm {1}-V^\textrm{acc}_{\varepsilon '}, \end{aligned}$$
(8)
$$\begin{aligned} & \mathcal {D}^{C \rightarrow MF}_{k}: \rho _C \mapsto \text {Dec}\, \left( \textrm{Tr}\,_\textrm{trap} \sqrt{V^{\textrm{acc}}_{\varepsilon '}} \pi _{k_1}^\dagger D_{k_2}^{\dag }\rho _C D_{k_2} \pi _{k_1} \sqrt{V^{\textrm{acc}\dagger }_{\varepsilon '}} \right) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & + \Omega _M \textrm{Tr}\,_{M,\mathrm trap} \left( \sqrt{V^{\textrm{rej}}_{\varepsilon '}} \pi _{k_1}^\dagger D_{k_2}^{\dag }\rho _C D_{k_2} \pi _{k_1} \sqrt{V^{\textrm{rej}\dagger }_{\varepsilon '}} \right) \otimes | \text {rej} \rangle \langle \text {rej} |. \end{aligned}$$
(9)
$$\begin{aligned} 1-\varepsilon _\textrm{dec} = \Big (\textrm{Erf}\frac{\varepsilon '}{e^{-r/2}\sqrt{2}}\Big )^{2z}. \end{aligned}$$
(10)
4 Security of our scheme
Theorem 4.1
Our scheme satisfies security definition 2.3 with parameter \(\eta =(\frac{n}{n+2z})^{t+1} + \frac{z}{n+2z}\textrm{Erfc}\frac{\varepsilon -\varepsilon '}{e^{-r/2}\sqrt{2}} +\mathcal{O}(e^{-2\Delta ^2 e^{-r}})\), i.e.
$$\begin{aligned} \forall _{\rho _{MR}}\quad \Big \Vert \mathcal {C}(\rho _{MR}) - \mathcal {F}(\rho _{MR}) \Big \Vert _\textrm{tr} < (\frac{n}{n+2z})^{t+1} + \frac{z}{n+2z}\textrm{Erfc}\frac{\varepsilon -\varepsilon '}{e^{-r/2}\sqrt{2}} + \mathcal{O}(e^{-2\Delta ^2 e^{-r}}). \end{aligned}$$
(11)
Here Erfc is the complementary error function. Setting \(z=n\) as in the DV case yields \((\frac{n}{n+2z})^{t+1}\rightarrow (\frac{1}{3})^{t+1}\), which corresponds to the DV result [13]. The Erfc term arises because of the imperfect squeezing. The \(\Delta \)-dependent term arises because of the energy constraint on the QOTP encryption.
Preferably we want the Erfc term to be smaller than \((\frac{n}{n+2z})^{t+1}\). Again taking \(z=n\), and using \(\textrm{Erfc}^\textrm{inv}(x)\approx \sqrt{\frac{1}{2}\ln \frac{2}{\pi x^2} }\) for \(x\ll 1\), this requirement implies \(\frac{\varepsilon -\varepsilon '}{e^{-r/2}}> \sqrt{2t\ln 3-\ln \frac{\pi }{2}}\).
The rest of Section 4 consists of the proof of Theorem 4.1. We first give some high-level intuition. The goal is to show that an actual run of the protocol, including the attack, is indistinguishable from the ideal case. The ideal functionality of the verification is to act as follows: (i) if the message has not been modified, output ‘accept’ and the state; (ii) if the message has been modified, output ‘reject’ and a random dummy state.
A run of the protocol is described as a channel from the input message state to the output of the verification. Indistinguishability (in terms of trace distance) has to be proven between the channel that describes the actual protocol run and the channel based on the ideal functionality. The ideal channel is generated by a simulator that has no access to the secret key but reproduces the same observable outcomes, statistically. The simulator ignores the message, generates a random ‘fake’ ciphertext, emulates the adversary, and invokes the ideal verification functionality. Indistinguishability between the channels implies that an attacker cannot tell whether they are attacking the real scheme or the simulator’s mock-up. Since the simulator makes no use of the key or the message, this means that the key and the message are secure. The fake ciphertext is implemented as EPR pairs, with half of the pairs kept by the simulator. In the ideal verification, the integrity of the EPR pairs is checked.
The attack is described as a superposition of displacements “\(\alpha \)” on the register C, entangled with the attacker’s reference system R. The attack on the encoded state \(\rho _C\) yields a double summation over \(\alpha ,\alpha '\), with displacement \(\alpha \) acting on \(\rho _C\) from the left and \(\alpha '\) from the right. In the idealized case, the \(\rho _C\) consists of one side of EPR pairs, which immediately leads to \(\alpha '=\alpha \). In the real-world case, the One-Time Pad (almost) eliminates the off-diagonals \(\alpha '\ne \alpha \) via the ‘twirl’ (Lemma 4.6.1) identity. The intuition is that the OTP encryption is so good that it produces a state that is as randomized as an EPR half.2 Next, the ideal verification imposes constraints on the trap modes as well as the encoded-message modes. On the other hand, the real-world verification imposes constraints only on the trap modes. By a combinatorial argument it is shown that the imperfect verification is almost as good as the ideal, by virtue of the random permutation of modes.
4.1 CV twirl
Lemma 4.2
(CV Displacement Twirl) Let \(D(\cdot )\) be the single-mode displacement operator. For any \(\rho \) it holds that
$$\begin{aligned}&\int _{\mathbb {C}}d^2\gamma \frac{1}{2\pi \Delta ^2} e^{-\frac{|\gamma |^2}{2\Delta ^2}} \, D^\dagger (\gamma ) D(\alpha ) D(\gamma ) \, \rho \, D^\dagger (\gamma ) D^\dagger (\alpha ') D(\gamma ) \nonumber \\&\quad = e^{-2\Delta ^2 |\alpha -\alpha '|^2} D(\alpha ) \rho D^\dagger (\alpha '). \end{aligned}$$
(12)
Proof
From (1) we have \(D(\alpha )D(\gamma )=e^{\frac{\alpha \bar{\gamma }-\bar{\alpha }\gamma }{2}}D(\alpha +\gamma )\). Multiplying from the left with \(D(-\gamma )\) and applying (1) again yieldsBy the same reasoning it holds that \(D^{\dag }(\gamma ) D^{\dag }(\alpha ') D(\gamma )= e^{-\alpha '\bar{\gamma }+\bar{\alpha }' \gamma } D^{\dag }(\alpha ')\). We getWe write \(\gamma =x+iy\), which gives \(\gamma (\bar{\alpha }'-\bar{\alpha })-\bar{\gamma }(\alpha '-\alpha ) = -2i x \textrm{Im}\,(\alpha '-\alpha ) +2i y \textrm{Re}\,(\alpha '-\alpha )\) and \(|\gamma |^2=x^2+y^2\). The integral over the complex plane becomes two separated Gaussian integrals over x and y. Performing the integrals yields (12). \(\square \)
$$\begin{aligned} D^{\dag }(\gamma )D(\alpha )D(\gamma )= & e^{\frac{\alpha \bar{\gamma }-\bar{\alpha }\gamma }{2}}D(-\gamma )D(\alpha +\gamma ) \end{aligned}$$
(13)
$$\begin{aligned}= & e^{\frac{\alpha \bar{\gamma }-\bar{\alpha }\gamma }{2}} e^{\frac{-\gamma (\bar{\alpha }+\bar{\gamma }) +\bar{\gamma }(\alpha +\gamma )}{2}} D(\alpha ) \end{aligned}$$
(14)
$$\begin{aligned}= & e^{\alpha \bar{\gamma }-\bar{\alpha }\gamma } D(\alpha ). \end{aligned}$$
(15)
$$\begin{aligned} D^{\dag }(\gamma ) D(\alpha )D(\gamma )\;\; \rho \;\; D^{\dag }(\gamma ) D^{\dag }(\alpha ') D(\gamma ) = e^{\gamma (\bar{\alpha }'-\bar{\alpha })-\bar{\gamma }(\alpha '-\alpha )}\; D(\alpha ) \rho D^{\dag }(\alpha '). \end{aligned}$$
(16)
Remark
In the DV case the Pauli twirl result is \({\mathbb E}_Q Q^{\dag }P Q \rho Q^{\dag }{P'}^{\dag }Q = \delta _{PP'}P\rho P^{\dag }\), where \(P,P',Q\) are n-qubit Paulis. Instead of the Kronecker delta, our result has a Gaussian factor. However, we will see that \(e^{-2\Delta ^2 |\alpha -\alpha '|^2}\) for \(\Delta ^2\gg e^r\) essentially acts as a Kronecker delta \(\delta _{\alpha '\alpha }\).
4.2 Real world channel
We introduce shorthand notationUsing the POVM for the accept case, the real world channel can be expressed as follows:The attack is modeled as the unitary \(U_{CR}\). Analogous to the approach in [13], we expand the attack as \(U_{CR} = \sum _{\mathbf {\alpha }} \chi (\vec {\alpha }) \, D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}\) where \(\mathbf {\alpha }\) stands for \((\alpha _1,\ldots , \alpha _{n+2z})\), and it holds that \(\sum _{\mathbf {\alpha }} |\chi (\vec {\alpha })|^2 = 1\) and \(U_R^{\mathbf {\alpha }} (U_R^{\mathbf {\alpha }'})^\dagger =\mathbbm {1}_{R}\delta _{\mathbf {\alpha }'\mathbf {\alpha }}\).3 There is a natural ‘resolution’ or length scale for the displacement \(\mathbf {\alpha }\), namely the squeezing width \(e^{-r/2}\). Any \(\alpha _i'\) and \(\alpha _i\) that are much closer to each other than \(e^{-r/2}\) cannot be distinguished by Bob.
$$\begin{aligned} \psi =\text {Enc}(\rho _{MR}) \otimes | X \rangle \langle X |^{\otimes z} \otimes | P \rangle \langle P |^{\otimes z}. \end{aligned}$$
(17)
$$\begin{aligned} & \mathcal {C}^{MR \rightarrow MRF}: \rho _{MR} \mapsto \textrm{Tr}\,_\textrm{trap}{\mathbb E}_{k_1,k_2} \Bigg \{ \nonumber \\ & \text {Dec} \Bigg ( \sqrt{V^{\textrm{acc}}_{\varepsilon '}} \pi _{k_1}^\dagger D_{k_2}^{\dagger } U_{CR}\Big (D_{k_2} \pi _{k_1} \psi \pi _{k_1}^\dagger D_{k_2}^{\dagger }\Big )U^{\dagger }_{CR} D_{k_2} \pi _{k_1} \sqrt{V^{\textrm{acc}\dagger }_{\varepsilon '}} \Bigg ) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & +\Omega _M \textrm{Tr}\,_{\!M} \Bigg (\!\! \sqrt{V^{\textrm{rej}}_{\varepsilon '}} \pi _{k_1}^\dagger D_{k_2}^{\dagger } U_{CR}\Big (D_{k_2} \pi _{k_1} \psi \pi _{k_1}^\dagger D_{k_2}^{\dagger } \Big ) U^{\dagger }_{CR}D_{k_2} \pi _{k_1} \sqrt{V^{\textrm{rej}\dagger }_{\varepsilon '}} \Bigg ) \!\otimes \! | \text {rej} \rangle \langle \text {rej} | \Bigg \}. \end{aligned}$$
With this representation of the attack, the real world channel is given byHere we have used that the QECC decoding is a linear operation. The \({\mathbb E}_{k_2}\) expectation gives rise to a CV twirl, which we evaluate using Lemma 4.2. The resulting state is given byWe treat the factor \(e^{-2\Delta ^2|\mathbf {\alpha }'-\mathbf {\alpha }|^2}\) as the Kronecker delta \(\delta _{\mathbf {\alpha }'\mathbf {\alpha }}\) plus a correction term of order \(\mathcal{O}(e^{-2 \Delta ^2 e^{-r}})\). The correction term leads to the final term in (11), and below we will further ignore it. The Kronecker delta part yieldsNext we rewrite the permutation of the displacement \(D_C(\mathbf {\alpha })\) as a displacement over the permuted \(\mathbf {\alpha }\).We explicitly write out the POVM V as specified in (8). For the C register we use label ‘msg’ for the first n modes, the label ‘X’ for the z trap modes after that, and ‘P’ for the final z modes. For conciseness we write only the Accept part. The Reject part is analogous, and will be presented explicitly again at the end of the analysis.Next we evaluate the trace over all the trap modes. In each trap mode independently we get an x-integral or p-integral of a displaced squeezed state, with integration interval \((-\varepsilon ',\varepsilon ')\), i.e. an integral of the form \(\int _{-\varepsilon '}^{\varepsilon '} \! \textrm{d}x \, |\langle x | D(\beta ) | X \rangle |^2\) for some \(\beta \in {\mathbb C}\). It holds that \(|\langle x | D(\beta ) | X \rangle |^2 = (2\pi e^{-r})^{-1/2}\exp (-\frac{(x-\sqrt{2} \textrm{Re}\,\beta )^2}{2e^{-r}})\) and \(|\langle p | D(\beta ) | P \rangle |^2 = (2\pi e^{-r})^{-1/2}\exp (-\frac{(p-\sqrt{2} \textrm{Im}\,\beta )^2}{2e^{-r}})\). We getFor \(r\gg 1\) and properly tuned \(\varepsilon '\) (\(\varepsilon ' > e^{-r/2}\)), this combination of error functions acts as a selection function \(\tilde{s}\) that equals (almost) 1 if \(| b| \le \varepsilon '/\sqrt{2} \) and (almost) 0 otherwise. The product of all the contributions from the trap states yields an overall selection function \(\tilde{G}\),Finally, we can write the real-world channel as
$$\begin{aligned} & \mathcal {C}^{MR \rightarrow MRF}: \rho _{MR} \mapsto \textrm{Tr}\,_\textrm{trap}{\mathbb E}_{k_1} \sum _{\mathbf {\alpha }} \chi (\vec {\alpha }) \sum _{\mathbf {\alpha }'} \overline{\chi (\vec {\alpha }')} {\mathbb E}_{k_2}\Bigg \{ \nonumber \\ & \text {Dec} \Bigg ( \sqrt{V^{\textrm{acc}}_{\varepsilon '}} \pi _{k_1}^\dagger D_{k_2}^{\dagger } ( D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }})D_{k_2} \pi _{k_1}\psi \nonumber \\ & \quad \quad \pi _{k_1}^\dagger D_{k_2}^{\dagger } ( D_C(-\vec {\alpha }') \otimes U_{R}^{\vec {\alpha }'\dagger }) D_{k_2} \pi _{k_1} \sqrt{V^{\textrm{acc}\dagger }_{\varepsilon '}} \Bigg )\otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & +\Omega _M \textrm{Tr}\,_{M} \Bigg ( \sqrt{V^{\textrm{rej}}_{\varepsilon '}} \pi _{k_1}^\dagger D_{k_2}^{\dagger } ( D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }})D_{k_2} \pi _{k_1}\psi \nonumber \\ & \quad \quad \pi _{k_1}^\dagger D_{k_2}^{\dagger } ( D_C(-\vec {\alpha }') \otimes U_{R}^{\vec {\alpha }'\dagger })D_{k_2} \pi _{k_1} \sqrt{V^{\textrm{rej}\dagger }_{\varepsilon '}} \Bigg )\otimes | \text {rej} \rangle \langle \text {rej} | \Bigg \}. \end{aligned}$$
(18)
$$\begin{aligned} & \mathcal {C}^{MR \rightarrow MRF}: \rho _{MR} \mapsto \textrm{Tr}\,_\textrm{trap}{\mathbb E}_{k_1} \sum _{\mathbf {\alpha }} \chi (\vec {\alpha }) \sum _{\mathbf {\alpha }'} \overline{\chi (\vec {\alpha }')} e^{-2\Delta ^2|\mathbf {\alpha }'-\mathbf {\alpha }|^2} \Bigg \{ \nonumber \\ & \text {Dec} \Bigg ( \sqrt{V^{\textrm{acc}}_{\varepsilon '}} \pi _{k_1}^\dagger ( D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}) \pi _{k_1}\psi \pi _{k_1}^\dagger ( D_C(-\vec {\alpha }') \otimes U_{R}^{\vec {\alpha }'\dagger }) \pi _{k_1} \sqrt{V^{\textrm{acc}\dagger }_{\varepsilon '}} \Bigg )\otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & +\Omega _M \textrm{Tr}\,_{\!\!M} \Bigg (\!\!\! \sqrt{V^{\textrm{rej}}_{\varepsilon '}} \pi _{k_1}^\dagger \! ( D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}) \pi _{k_1}\psi \pi _{k_1}^\dagger ( D_C(-\vec {\alpha }') \otimes U_{R}^{\vec {\alpha }'\dagger }) \pi _{k_1} \!\sqrt{V^{\textrm{rej}\dagger }_{\varepsilon '}} \!\Bigg ) \!\!\otimes \! | \text {rej} \rangle \langle \text {rej} | \Bigg \} \! . \end{aligned}$$
$$\begin{aligned} & \mathcal {C}^{MR \rightarrow MRF}(\rho _{MR}) = \textrm{Tr}\,_\textrm{trap}{\mathbb E}_{k_1} \sum _{\vec {\alpha }} |\chi (\vec {\alpha })|^2\Bigg \{ \nonumber \\ & \text {Dec} \Bigg ( \sqrt{V^{\textrm{acc}}_{\varepsilon '}} \pi _{k_1}^\dagger (D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}) \pi _{k_1}\psi \pi _{k_1}^\dagger (D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }})^\dagger \pi _{k_1} \sqrt{V^{\textrm{acc}\dagger }_{\varepsilon '}} \Bigg ) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & +\Omega _M \textrm{Tr}\,_{\!\!M} \!\Bigg (\!\! \sqrt{V^{\textrm{rej}}_{\varepsilon '}} \pi _{k_1}^\dagger (D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}) \pi _{k_1}\psi \pi _{k_1}^\dagger (D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }})^\dagger \pi _{k_1} \sqrt{V^{\textrm{rej}\dagger }_{\varepsilon '}} \!\Bigg )\!\otimes \! | \text {rej} \rangle \langle \text {rej} | \Bigg \}. \end{aligned}$$
$$\begin{aligned} & \!\!\!\!\!\!\!\! \mathcal {C}^{MR \rightarrow MRF}(\rho _{MR}) = \textrm{Tr}\,_\textrm{trap}{\mathbb E}_{k_1}\sum _{\vec {\alpha }} |\chi (\vec {\alpha })|^2 \Bigg \{ \nonumber \\ & \!\!\!\!\!\!\!\! \text {Dec} \Bigg ( \sqrt{V^{\textrm{acc}}_{\varepsilon '}} (D_C(\pi ^{-1}_{k_1}\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}) \psi (D_C(\pi ^{-1}_{k_1}\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }})^\dagger \sqrt{V^{\textrm{acc}\dagger }_{\varepsilon '}} \Bigg ) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & \!\!\!\!\!\!\!\! +\Omega _M \textrm{Tr}\,_{\!\!M} \!\Bigg (\!\! \sqrt{V^{\textrm{rej}}_{\varepsilon '}} (D_C(\pi ^{-1}_{k_1}\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}) \psi (D_C(\pi ^{-1}_{k_1}\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }})^\dagger \sqrt{V^{\textrm{rej}\dagger }_{\varepsilon '}} \Bigg )\otimes | \text {rej} \rangle \langle \text {rej} | \Bigg \}.\nonumber \\ \end{aligned}$$
(19)
$$\begin{aligned} & \mathcal {E}^{MR \rightarrow MRF}(\rho _{MR}) = \textrm{Tr}\,_\textrm{trap}{\mathbb E}_{k_1} \sum _{\mathbf {\alpha }} |\chi (\vec {\alpha })|^2 \Bigg \{ \nonumber \\ & \text {Dec} \Bigg ( (\mathbbm {1}^{\otimes n} \otimes \Bigg [ \int _{-\varepsilon '}^{\varepsilon '}\!\! \textrm{d}x \, | x \rangle \langle x | \Bigg ]^{\otimes z} \otimes \Bigg [ \int _{-\varepsilon '}^{\varepsilon '}\!\! \textrm{d}p \, | p \rangle \langle p | \Bigg ]^{\otimes z} ) \nonumber \\ & ({[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_\textrm{msg} \otimes {[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_X \otimes {[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_P \otimes U_{R}^{\vec {\alpha }}) \nonumber \\ & \qquad (\text {Enc}_M(\rho _{MR}) \otimes | X \rangle \langle X |^{\otimes z} \otimes | P \rangle \langle P |^{\otimes z}) \nonumber \\ & ({[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_\textrm{msg} \otimes {[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_X \otimes {[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_P \otimes U_{R}^{\vec {\alpha }})^\dagger \Bigg ) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & +\text{ Reject } \text{ part } \end{aligned}$$
(20)
$$\begin{aligned} \tilde{g}_1(\beta )&{\mathop {=}\limits ^\textrm{def}}&\int _{-\varepsilon '}^{\varepsilon '} \! \textrm{d}x \, |\langle x | D(\beta ) | X \rangle |^2 = \tilde{s}(\textrm{Re}\,\beta ) \end{aligned}$$
(21)
$$\begin{aligned} \tilde{g}_2(\beta )&{\mathop {=}\limits ^\textrm{def}}&\int _{-\varepsilon '}^{\varepsilon '} \! \textrm{d}p \, |\langle p | D(\beta ) | P \rangle |^2 = \tilde{s}(\textrm{Im}\,\beta ) \end{aligned}$$
(22)
$$\begin{aligned} \tilde{s}(b)&{\mathop {=}\limits ^\textrm{def}}&\frac{1}{2}\textrm{Erf}\frac{\varepsilon '+b\sqrt{2} }{e^{-r/2}\sqrt{2}} +\frac{1}{2}\textrm{Erf}\frac{\varepsilon '-b\sqrt{2} }{e^{-r/2}\sqrt{2}} \end{aligned}$$
(23)
$$\begin{aligned} \tilde{G}(\pi ,\mathbf {\alpha }) {\mathop {=}\limits ^\textrm{def}}\prod _{j=1}^z \tilde{g}_1\left( [\pi ^{-1}\mathbf {\alpha }]_{X_j} \right) \; \tilde{g}_2\left( [\pi ^{-1}\mathbf {\alpha }]_{P_j} \right) . \end{aligned}$$
(24)
$$\begin{aligned} & \!\!\!\!\!\!\!\! \mathcal {C}^{MR \rightarrow MRF}(\rho _{MR}) = {\mathbb E}_{k_1} \sum _{\mathbf {\alpha }} |\chi (\vec {\alpha })|^2 \Bigg \{ \tilde{G}(\pi _{k_1},\vec {\alpha }) \nonumber \\ & \!\!\!\!\!\!\!\! \text {Dec} \Bigg (({[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_\textrm{msg} \otimes U_{R}^{\vec {\alpha }})\text {Enc}_M(\rho _{MR})({[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_\textrm{msg} \otimes U_{R}^{\vec {\alpha }})^\dagger \Bigg ) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\ & \!\!\!\!\!\!\!\! + [1-\tilde{G}(\pi _{k_1},\vec {\alpha })] \Omega _M \textrm{Tr}\,_{M} \nonumber \\ & \!\!\!\!\!\!\!\! \textrm{Dec}\Bigg ( \!\! ({[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_\textrm{msg} \otimes U_{R}^{\vec {\alpha }})\text {Enc}_M(\rho _{MR})({[D_C(\pi _{k_1}^{-1}\vec {\alpha })]}_\textrm{msg} \otimes U_{R}^{\vec {\alpha }})^\dagger \!\!\Bigg ) \!\otimes \! | \text {rej} \rangle \langle \text {rej} | \Bigg \}.\nonumber \\ \end{aligned}$$
(25)
4.3 The ideal channel
We now specify the ideal channel (4) for our scheme, again closely following [13]. The register C contains one side of \(n+2z\) EPR pairs. (The other side is denoted as \(C'\).) We work with the two-mode squeezed vacuum as detailed in Section 2.1. We denote the squeezing parameter as s; we work in the limit \(s\rightarrow \infty \). Note that this limit is allowed since we are dealing with an idealized functionality rather than something that needs to be implemented. We use the notation \(| \mathrm TMSV \rangle \) to denote the normalised state, as opposed to the pseudo-normalised beamsplitter-mixture of \(| x=0 \rangle \) and \(| p=0 \rangle \), which we will denote as \(| \mathrm EPR \rangle \).
The attack is applied to the \(k_1\)-permuted modes; then the modes are unpermuted and finally it is verified if the EPR pairs are unmodified. Specifically, the simulator checks if more than t modes out of the first n have been noticeably displaced, and if any of the trap modes have been displaced by more than \(\delta \).
Next we look at the verification step. For displacement \(u\in {\mathbb C}^{n}\) we define a ‘Hamming weight’ \(w_\delta (\textbf{u}) = \#\{j|\;\; |u_j|>\delta \}\) which counts how many of the n modes have a noticeable displacement. The set of displacements that get accepted by the simulator is given byNote that the parameter \(\varepsilon \) is slightly larger than the \(\varepsilon '\) of the real-world channel. The simulator’s POVM for the verification is written as \((V^\textrm{acc}_\mathcal {F}, V^\textrm{rej}_\mathcal {F})\), with \(V^\textrm{rej}_\mathcal {F}=\mathbbm {1}-V^\textrm{acc}_\mathcal {F}\). We haveThe mapping that represents the ideal channel is given byHere \(\mathcal {S}_{n+2z}\) stands for the set of permutations of \(n+2z\) modes. Again we write \(U_{CR} = \sum _{\mathbf {\alpha }} \chi (\vec {\alpha }) \, D_C(\vec {\alpha }) \otimes U_{R}^{\vec {\alpha }}\) with normalisation \(\sum _{\mathbf {\alpha }} |\chi (\vec {\alpha })|^2 = 1\). Again we use \(\pi ^{\dag }D(\mathbf {\alpha })\pi =D(\pi ^{-1}\mathbf {\alpha })\). Furthermore we use cyclic property of the trace to rotate \(\sqrt{V_\mathcal {F}}\) so that the square roots combine into \(V_\mathcal {F}\); then we substitute the POVM (27) into (28). This givesHere all the displacements act on the C space; the \(I(\beta \in \mathcal {D}_\mathcal {F})\) is an indicator function that equals 1 when the condition is met; the abbreviation ‘same’ stands for the same state in \(MRCC'\) space as in the line above. Taking the trace \(\textrm{Tr}\,_{CC'}\) yields a factor \(\langle \mathrm TMSV | D_\beta ^{\dag }D_{\pi ^{-1}\alpha } | \mathrm EPR \rangle \langle \mathrm EPR | D_{\pi ^{-1}\alpha '}^{\dag }D_\beta | \mathrm TMSV \rangle \), which evaluates to \(\delta _{\mathbf {\alpha }' \mathbf {\alpha }}\delta (\beta -\pi ^{-1}\mathbf {\alpha })\) Carrying out the integral over \(\mathbf {\beta }\) and the sum over \(\mathbf {\alpha }'\) yields
$$\begin{aligned} \mathcal {D}_\mathcal {F}{\mathop {=}\limits ^\textrm{def}}\Big \{ (\textbf{u},\mathbf {\gamma },\mathbf {\psi })\in {\mathbb C}^{n+z+z}|\;\; w_\delta (\textbf{u})\le t \;\wedge \; \forall _i |\textrm{Re}\,\gamma _i|\le \frac{\varepsilon }{\sqrt{2}}\;\wedge \; \forall _i |\textrm{Im}\,\psi _i|\le \frac{\varepsilon }{\sqrt{2}} \Big \}. \end{aligned}$$
(26)
$$\begin{aligned} V^\textrm{acc}_\mathcal {F}= \int _{\mathcal {D}_\mathcal {F}}\!\!\!\!\! \textrm{d}^2\mathbf {\beta }\; D_C(\mathbf {\beta })| \textrm{EPR} \rangle \langle \textrm{EPR} |_{CC'}^{\otimes (n+2z)}D_C^{\dag }(\mathbf {\beta }). \end{aligned}$$
(27)
$$\begin{aligned}&\mathcal {F}^{MR \rightarrow MRF}: \rho _{MR} \mapsto \textrm{Tr}\,_{CC'} {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \Big \{\nonumber \\&\Big ( \sqrt{V^\textrm{acc}_{\mathcal {F}}} \pi _C^\dagger U_{CR} \pi _C (\rho _{MR} \otimes | \textrm{TMSV} \rangle \langle \textrm{TMSV} |^{\otimes (n+2z)}_{CC'}) \pi _C^{\dagger } U_{CR}^{\dagger } \pi _C\sqrt{{V^{\textrm{acc}\dagger }_{\mathcal {F}}}} \Big ) \otimes | \text {acc} \rangle \langle \text {acc} | \nonumber \\&+ \Omega _M \textrm{Tr}\,_{M} \Big ( \sqrt{V^\textrm{rej}_{\mathcal {F}}} \pi _C^{\dag }U_{CR} \pi _C (\rho _{MR} \otimes | \textrm{TMSV} \rangle \langle \textrm{TMSV} |^{\otimes (n+2z)}_{CC'}) \pi _C^{\dagger } U_{CR}^{\dagger } \pi _C \sqrt{{V^{\textrm{rej}\dagger }_{\mathcal {F}}}} \Big ) \nonumber \\&\otimes | \text {rej} \rangle \langle \text {rej} | \Big \}. \end{aligned}$$
(28)
$$\begin{aligned}&\mathcal {F}^{MR \rightarrow MRF}(\rho _{MR}) = {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \sum _{\mathbf {\alpha }}\sum _{\mathbf {\alpha }'} \chi (\mathbf {\alpha }) \overline{\chi (\mathbf {\alpha }')} \textrm{Tr}\,_{CC'} \int \textrm{d}^2\mathbf {\beta }\Big \{ I(\beta \in \mathcal {D}_\mathcal {F}) \nonumber \\&U^\alpha _R \rho _{MR} U_R^{\alpha '\dagger } \otimes D_{\pi ^{-1}\mathbf {\alpha }'}^{\dag }D_\beta | \textrm{TMSV} \rangle \langle \textrm{TMSV} |^{\otimes (n+2z)}_{CC'} D_\beta ^{\dag }D_{\pi ^{-1}\mathbf {\alpha }} | \textrm{EPR} \rangle \langle \textrm{EPR} |^{\otimes (n+2z)}_{CC'} \nonumber \\&\otimes | \textrm{acc} \rangle \langle \textrm{acc} | + I(\beta \notin \mathcal {D}_\mathcal {F}) \Omega _M\otimes \textrm{Tr}_M [\cdots \textrm{same}\cdots ] \otimes | \textrm{rej} \rangle \langle \textrm{rej} |\Big \}. \end{aligned}$$
$$\begin{aligned} & \mathcal {F}^{MR \rightarrow MRF}(\rho _{MR}) = {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \sum _{\mathbf {\alpha }} |\chi (\mathbf {\alpha })|^2 \Big \{ I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F})U_R^\alpha \rho _{MR}U_R^{\alpha \dagger }\otimes | \textrm{acc} \rangle \langle \textrm{acc} |\nonumber \\ & \quad \quad \quad \quad \quad \quad +I(\pi ^{-1}\mathbf {\alpha }\notin \mathcal {D}_\mathcal {F}) \Omega _M \otimes \textrm{Tr}_M U_R^\alpha \rho _{MR}U_R^{\alpha \dagger } \otimes | \textrm{rej} \rangle \langle \textrm{rej} |\Big \}. \end{aligned}$$
(29)
4.4 Finishing the proof
Note that we can write \(I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F})U_R^\alpha \rho _{MR}U_R^{\alpha \dagger }\) in the more complicated form \(I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F}) \textrm{Dec}\Big ( [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}\otimes U_R^\alpha \;\; \textrm{Enc}\rho _{MR}\;\; [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}^{\dag }\otimes U_R^{\alpha \dagger }\Big )\). This equality holds because, under the condition on \(\mathbf {\alpha }\), the decoding is guaranteed to recover \(\rho _{MR}\). We use the more complicated form to express the difference \(\mathcal {C}-\mathcal {F}\) in a compact form,Next we use the triangle inequality to obtain the following boundIn the last step we used that the trace distance between two normalised states cannot exceed 1.
$$\begin{aligned}&\mathcal {C}(\rho _{MR}) - \mathcal {F}(\rho _{MR}) = {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \sum _{\mathbf {\alpha }} |\chi (\mathbf {\alpha })|^2 \Big [ \Big \{ \tilde{G}(\pi ,\mathbf {\alpha })-I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F}) \Big \}&\nonumber \\ &\textrm{Dec}\Big ( [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}\otimes U_R^\alpha \;\; \textrm{Enc}\rho _{MR}\;\; [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}^{\dag }\otimes U_R^{\alpha \dagger }\Big ) \otimes | \textrm{acc} \rangle \langle \textrm{acc} |&\nonumber \\ &+ \Big \{ 1-\tilde{G}(\pi ,\mathbf {\alpha })-I(\pi ^{-1}\mathbf {\alpha }\notin \mathcal {D}_\mathcal {F}) \Big \}\Omega _M \otimes \textrm{Tr}_M \textrm{Dec}(\cdots \textrm{same}\cdots ) \otimes | \textrm{rej} \rangle \langle \textrm{rej} |\Big ]&\end{aligned}$$
(30)
$$\begin{aligned}&= {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \sum _{\mathbf {\alpha }} |\chi (\mathbf {\alpha })|^2 \Big \{ \tilde{G}(\pi ,\mathbf {\alpha })-I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F}) \Big \}&\nonumber \\ &\Big \{ \textrm{Dec}\Big ( [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}\otimes U_R^\alpha \;\; \textrm{Enc}\rho _{MR}\;\; [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}^{\dag }\otimes U_R^{\alpha \dagger }\Big ) \otimes | \textrm{acc} \rangle \langle \textrm{acc} |&\nonumber \\ &- \Omega _M \otimes \textrm{Tr}_M \textrm{Dec}(\cdots \textrm{same}\cdots ) \otimes | \textrm{rej} \rangle \langle \textrm{rej} |\Big \}.&\end{aligned}$$
(31)
$$\begin{aligned}&\Vert \mathcal {C}(\rho _{MR}) - \mathcal {F}(\rho _{MR}) \Vert _\textrm{tr} \le {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \sum _{\mathbf {\alpha }} |\chi (\mathbf {\alpha })|^2 \Big \{ \tilde{G}(\pi ,\mathbf {\alpha })-I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F}) \Big \}&\nonumber \\ &\Big \Vert \textrm{Dec}\Big ( [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}\otimes U_R^\alpha \;\; \textrm{Enc}\rho _{MR}\;\; [D_{\pi ^{-1}\mathbf {\alpha }}]_\textrm{msg}^{\dag }\otimes U_R^{\alpha \dagger }\Big ) \otimes | \textrm{acc} \rangle \langle \textrm{acc} |&\nonumber \\ &- \Omega _M \otimes \textrm{Tr}_M \textrm{Dec}(\cdots \textrm{same}\cdots ) \otimes | \textrm{rej} \rangle \langle \textrm{rej} |\Big \Vert _\textrm{tr}&\end{aligned}$$
(32)
$$\begin{aligned}&\le \sum _{\mathbf {\alpha }} |\chi (\mathbf {\alpha })|^2 {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} \Big \{ \tilde{G}(\pi ,\mathbf {\alpha })-I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F}) \Big \}.&\end{aligned}$$
(33)
Note that the functions \(\tilde{G}\) and I are very similar. The indicator I exactly selects displacements \(\mathbf {\alpha }\in {\mathbb C}^{n+2z}\) such that in the traps part of \(\pi ^{-1}\mathbf {\alpha }\) the measured component is \(\frac{\varepsilon }{\sqrt{2}}\)-close to zero, and in the message part of \(\pi ^{-1}\mathbf {\alpha }\) the Hamming weight \(w_\delta \) is low.
The function \(\tilde{G}\) is not an exact indicator function, having continuous behaviour. However, for \(e^{-r/2}\ll \varepsilon '\) the \(\tilde{G}\) is extremely close to a step function which we will denote as \(G(\pi ,\mathbf {\alpha })= \prod _{j=1}^z \Theta (\varepsilon -\sqrt{2} |[\textrm{Re}\,\pi ^{-1}\alpha ]_{X_j}|) \Theta (\varepsilon -\sqrt{2} |[\textrm{Im}\,\pi ^{-1}\alpha ]_{P_j}|)\). (Note that we write \(\varepsilon \) instead of \(\varepsilon '\).) The G enforces the same conditions as I on the traps part of \(\pi ^{-1}\mathbf {\alpha }\), but ignores the message part. We write \(\tilde{G} = G + \Gamma \). The contribution from the imperfection \(\Gamma \) to (33) is given by \( \sum _{\mathbf {\alpha }} |\chi (\mathbf {\alpha })|^2 {\mathbb E}_{\pi \in \mathcal {S}_{n+2z}}\Gamma (\pi ,\mathbf {\alpha })\). We need to upperbound it. We observe that each of the factors \(\tilde{g}_1\), \(\tilde{g}_2\) in (24) lies in the interval [0, 1]. Consequently \(\tilde{G}\in [0,1]\). Hence, whenever \(G=1\) it must hold that \(\Gamma \le 0\). Next we consider the part of the \(\alpha \)-integral where \(G=0\); here we have \(\Gamma \ge 0\). The worst case (most positive \(\tilde{G}\) at \(G=0\)) occurs when the vector \(\mathbf {\alpha }\) consists of all zeros except for one entry which is infinitesimally larger than \(\varepsilon \) in either x or p direction and that component is moved into a trap mode by the permutation \(\pi ^{-1}\). This yields \(\Gamma =[\tilde{s}(0)]^{2z-1}\tilde{s}(\varepsilon /\sqrt{2}) < \tilde{s}(\varepsilon /\sqrt{2})\) \(< \frac{1}{2} - \frac{1}{2} \textrm{Erf}\frac{\varepsilon -\varepsilon '}{e^{-r/2}\sqrt{2}}\). Taking into account the probability \(\frac{2z}{n+2z}\) of getting permuted into a trap mode, we get the contribution \(\frac{z}{n+2z}\textrm{Erfc}\frac{\varepsilon -\varepsilon '}{e^{-r/2}\sqrt{2}}\) in (11).
The expression \(G(\pi ,\mathbf {\alpha })-I(\pi ^{-1}\mathbf {\alpha }\in \mathcal {D}_\mathcal {F})\) evaluates either to 0 or 1; it cannot become negative since I imposes more conditions than G. The value 1 occurs only if the traps are intact but the message has uncorrectable noise. (See Table 1).
Table 1
Behavior of indicator functions \( G \), \( I \), and their difference in different attack scenarios
Case | \( G \) | \( I \) | \( G - I \) |
|---|---|---|---|
All modes have negligible displacement | 1 | 1 | 0 |
Some trap has too much displacement | 0 | 0 | 0 |
All traps OK, message not OK (uncorrectable error) | 1 | 0 | 1 |
For the final step in the proof we have to tune the parameter \(\delta \) to \(\delta =\frac{\epsilon }{\sqrt{2}}\) in order to obtain symmetry between all the modes. Let u be the number of modes in \(\mathbf {\alpha }\) that contain a large displacement. We consider only vectors \(\mathbf {\alpha }\) that can yield \(G-I=1\) for some permutation \(\pi \). Such a vector must have \(u\in \{t+1,\ldots ,n\}\). The expression \({\mathbb E}_{\pi \in \mathcal {S}_{n+2z}} (G-I)\) is the probability, given a random permutation of \(n+2z\) modes, of placing the u noisy ones precisely in the first n positions. This probability is given byAs P(u) is a decreasing function of u we can write \(P(u) \le P(t+1)\). Next we writeHere we have used the inequality \(\frac{n-j}{n+2z-j} \le \frac{n}{n+2z}\), which holds for \(2z> n\). Finally we use the normalisation of \(\chi \). This yields the term \((\frac{n}{n+2z})^{t+1}\) in (11).
$$\begin{aligned} P(u) = \frac{{n \atopwithdelims ()u} u!}{{n+2z \atopwithdelims ()u} u!} = \frac{n!}{(n+2z)!}(n-u+1)\cdots (n-u+2z). \end{aligned}$$
(34)
$$\begin{aligned} P(t+1)=\frac{{n\atopwithdelims ()t+1}}{{n+2z\atopwithdelims ()t+1}}= \prod _{j=0}^t\frac{n-j}{n+2z-j} < \prod _{j=0}^t \frac{n}{n+2z} = (\frac{n}{n+2z})^{t+1}. \end{aligned}$$
(35)
5 Discussion
Our continuous-variable construction and its security proof bring no real surprises to those familiar with the discrete-variable quantum authentication schemes. However, some technical hurdles had to be overcome, e.g. dealing with the non-perfect CV QOTP, introducing the CV twirl and handling the approximate step functions.
We found that taking the attacker’s displacement \(\mathbf {\alpha }\) from a continuum leads to normalisation problems. First, the result of the CV twirl resembles a Kronecker delta but not a Dirac delta. (A factor \(\Delta ^2\) is missing.) Furthermore, taking the full trace of the attacked state, including the attacker’s R register, gives rise to a factor \(\delta (\mathbf {\alpha }'-\mathbf {\alpha })\) coming from the product \(U_R^{\mathbf {\alpha }}U_R^{\mathbf {\alpha }'\dagger }\). In the ideal case this gets combined with an additional factor \(\delta (\mathbf {\beta }-\pi ^{-1}\mathbf {\alpha }) \delta (\mathbf {\beta }-\pi ^{-1}\mathbf {\alpha }')\), which causes a divergent expression even after integration over \(\beta ,\alpha ,\alpha '\). It is left for future work to resolve this issue.
It is interesting to note what happens when the CV twirl is done with the ‘usual’ CV QOTP, which takes a uniform distribution on a finite surface. If the surface is the square \([-\Delta ,\Delta ]^2\) then integration of (16) over x, y gives \( \frac{\sin \Delta \cdot 2\textrm{Re}\,(\alpha '-\alpha )}{\Delta \cdot 2\textrm{Re}\,(\alpha '-\alpha )} \) \( \frac{\sin \Delta \cdot 2\textrm{Im}\,(\alpha '-\alpha )}{\Delta \cdot 2\textrm{Im}\,(\alpha '-\alpha )} \), which also approaches \(\delta _{\alpha '\alpha }\) in the limit \(\Delta \rightarrow \infty \). However, convergence to the Kronecker delta goes like \(\mathcal{O}(1/\Delta ^2)\) instead of our exponential convergence.
The scheme as presented authenticates a single-mode state. This is readily generalized to multiple modes either by authenticating each mode individually or by applying a quantum error-correcting code to a multi-mode message.
Acknowledgements
Part of this work was supported by the Dutch Startimpuls NAQT CAT-2 and NGF Quantum Delta NL CAT-2.
Declarations
Competing interests
The authors declare no competing interests.
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.