QPV 2023: Advances in quantum position verification

America/Toronto
Adrian Kent (University of Cambridge), Alex May (Perimeter Institute)
Description

Quantum position verification (QPV) schemes use the properties of quantum information and the relativistic signalling bound to verify the location of an object (sometimes called a “tag”) to distant observers in an environment that may contain would-be spoofers. The guarantee is based on the assumptions of the underlying security model; various theoretically and practically interesting security models have been proposed. The area is attracting increasing interest, with new theoretical developments in security analyses, emerging experimental studies of QPV systems, and recently discovered surprising and intriguing connections to topics in quantum gravity. A workshop on QPV will be held at the Perimeter Institute for Theoretical Physics.

The workshop will cover topics related to all aspects of QPV, including, but not limited to:

  • Theoretical developments related to the security of QPV schemes, including development or refinement of security models, proofs of security within given models, tradeoffs between security and efficiency, and Experimental studies of QPV and theoretical work aimed at developing practical QPV schemes.
  • QPV’s relationship to other cryptographic tasks and primitives.
  • QPV’s relationship to holography and quantum gravity.

 

Sponsored in part by:  

Territorial Land Acknowledgement

Perimeter Institute acknowledges that it is situated on the traditional territory of the Anishinaabe, Haudenosaunee, and Neutral peoples.

Perimeter Institute is located on the Haldimand Tract. After the American Revolution, the tract was granted by the British to the Six Nations of the Grand River and the Mississaugas of the Credit First Nation as compensation for their role in the war and for the loss of their traditional lands in upstate New York. Of the 950,000 acres granted to the Haudenosaunee, less than 5 percent remains Six Nations land. Only 6,100 acres remain Mississaugas of the Credit land. 

We thank the Anishinaabe, Haudenosaunee, and Neutral peoples for hosting us on their land.

Participants
  • Adrian Kent
  • Alex May
  • Andreas Bluhm
  • Angela Capel Cuevas
  • Anne Broadbent
  • Barbara Soda
  • Beni Yoshida
  • Bruno Giménez Umbert
  • Caroline Lima
  • Damián Pitalúa-García
  • Daniel Centeno Diaz
  • David Perez-Garcia
  • Debbie Leung
  • Emanuel-Cristian Boghiu
  • Eric Chitamber
  • Florian Speelman
  • Harry Buhrman
  • Hlér Kristjánsson
  • Ian George
  • Jasminder Sidhu
  • Jiayue Yang
  • Kfir Dolev
  • Kirsten Kanneworff
  • Llorenc Escola Farras
  • Lucien Hardy
  • Manasi Shingane
  • Maria Ciudad Alañón
  • Ningping Cao
  • Paul Kwiat
  • Philip Verduyn Lunel
  • Pierre Botteron
  • Rene Allerstorfer
  • Richard Cleve
  • Rushil Dandamudi
  • Sayonee Ray
  • Sukanya Ghosal
  • Takato Mori
  • Urbasi Sinha
  • Wolfgang Loeffler
  • Xinan Chen
  • Yusuf Alnawakhtha
Sarah Gardiner
    • 8:30 AM
      Registration PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 1
      QPV - A retroprospective PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60

      Quantum position verification (QPV) was first introduced, under the name quantum tagging, in a patent filed in 2004. It was first discussed in the academic literature in 2009-10. The schemes proposed to that point were shown to be breakable by teleportation attacks in 2010, and a general no-go theorem showing all schemes in this class are breakable was subsequently proved. However, in an alternative standard cryptographic security scenario, in which the tag is assumed to be able to keep classical data secret, unconditionally secure schemes were presented in 2010.
      The various terminologies and security scenarios highlight important points whose theoretical and practical implications still remain underexplored. In practice, one normally wants to verify the location of a person or valuable object, not of an easily replaceable tagging device, for at least two reasons: (i) the device itself is not so valuable, (ii) adversaries can easily construct a replacement device and thereby potentially spoof the scheme. This requires physical assumptions about the integrity of the tag and its attachment, and bounds on the speed with which the tag may be displaced or destroyed and replaced. QPV schemes that do not rely on such assumptions are breakable without teleportation or non-local computation attacks. In the other direction, when such significant physical assumptions are necessary, it may generally be reasonable to include tag security among them.
      In this overview I review the early history of QPV and describe various security scenarios and their potential applications. I give versions of the secure 2010 scheme designed for efficient practical implementation and discuss the frequency, accuracy and security of position verification attainable for these schemes with present technology. I also discuss the implied constraints on what may be attainable for QPV schemes involving real-time quantum measurement and/or quantum information processing.

      Speaker: Adrian Kent (University of Cambridge)
    • 10:30 AM
      Coffee Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 2
      QPV: An Overview and Reflections PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Harry Buhrman (Centrum Wiskunde & Informatica)
    • 12:00 PM
      Lunch PI/2-251 - Bistro - 2 FL (Perimeter Institute for Theoretical Physics)

      PI/2-251 - Bistro - 2 FL

      Perimeter Institute for Theoretical Physics

    • 3
      Popescu-Rohrlich correlations imply efficient instantaneous nonlocal quantum computation PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Anne Broadbent (University of Ottawa)
    • 2:00 PM
      Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 4:00 PM
      Poster Session and Social PI/2-251 - Upper Bistro (Perimeter Institute for Theoretical Physics)

      PI/2-251 - Upper Bistro

      Perimeter Institute for Theoretical Physics

      60
    • 8:30 AM
      Coffee station open
    • 4
      Non-local quantum computation meets quantum gravity PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Alex May (Perimeter Institute)
    • 10:30 AM
      Coffee Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 5
      Quantum Error-Correction and Holographic Task PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Beni Yoshida (Perimeter Institute)
    • 12:00 PM
      Lunch Break PI/2-251 - Upper Bistro (Perimeter Institute for Theoretical Physics)

      PI/2-251 - Upper Bistro

      Perimeter Institute for Theoretical Physics

      60
    • 6
      On the road to extracting QPV from holography: building a universal quantum computer in a simple QFT PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Kfir Dolev (Stanford University)
    • 8:30 AM
      Coffee station open
    • 7
      Protocols and Implementations of Quantum Position Verification PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speakers: Eric Chitamber (University of Illinois), Paul Kwiat (University of Illinois)
    • 11:00 AM
      Coffee Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 12:00 PM
      Lunch Break PI/2-251 - Upper Bistro (Perimeter Institute for Theoretical Physics)

      PI/2-251 - Upper Bistro

      Perimeter Institute for Theoretical Physics

      60
    • 8
      Long distance quantum communications: Quantum Experiments using Satellite Technologies (QUEST) PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Urbasi Sinha (Raman Research Institute)
    • 2:00 PM
      Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 9
      Towards experimental quantum position verification with true single photons by quantum dot cavity-QED PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Wolfgang Loeffler (Leiden University)
    • 5:00 PM
      Conference Dinner PI/2-251 - Upper Bistro (Perimeter Institute for Theoretical Physics)

      PI/2-251 - Upper Bistro

      Perimeter Institute for Theoretical Physics

      60
    • 8:30 AM
      Coffee station open
    • 10
      Attacking QPV with instantaneous non-local computation of low T-depth quantum circuits PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Florian Speelman (Centrum Wiskunde & Informatica)
    • 10:30 AM
      Coffee Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 11
      Making Existing Quantum Position Verification Protocols Secure Against Arbitrary Transmission Loss PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: Andreas Bluhm (LIG, Grenoble)
    • 12:00 PM
      Lunch Break PI/2-251 - Upper Bistro (Perimeter Institute for Theoretical Physics)

      PI/2-251 - Upper Bistro

      Perimeter Institute for Theoretical Physics

      60
    • 12
      QPV and Geometry of Banach spaces PI/4-405 - Bob Room (Perimeter Institute for Theoretical Physics)

      PI/4-405 - Bob Room

      Perimeter Institute for Theoretical Physics

      60
      Speaker: David Perez-Garcia (Universidad Complutense de Madrid)
    • 2:00 PM
      Break PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120
    • 8:30 AM
      Discussion and Collaboration Day
    • 9:00 AM
      Discussion Space Available PI/3-301 - Alice Room (Perimeter Institute for Theoretical Physics)

      PI/3-301 - Alice Room

      Perimeter Institute for Theoretical Physics

      30
    • 4:00 PM
      PI Friday Social PI/1-124 - Lower Bistro (Perimeter Institute for Theoretical Physics)

      PI/1-124 - Lower Bistro

      Perimeter Institute for Theoretical Physics

      120