Censorship of quantum resources against catalytic account sharing
Pinske, Mølmer
In quantum censorship, an agency oversees quantum communication in a public-domain network. The agency restricts the users communication to the free states of a quantum resource theory (QRT). Despite quantum correlations being fragile, any realistic censorship leaves behind some quantumness, raising concerns that censorship may be overcome through revival or distillation of quantum resources. Here, we introduce censorship protocols that do not require a perfect erasure of a quantum resource, but rather deem censorship successful if users are unable to restore the original quantum state using free operations. We investigate under which conditions censorship is secure, and when it might fail. Moreover, we address the issue of account sharing in quantum networks, wherein independent parties assist in transmitting quantum resources to censored users. This connects resource censorship to timely topics such as quantum catalysis and resource-assisted communication. Censorship protocols offer a novel perspective on quantum network security, that differs fundamentally from existing approaches such as quantum and post-quantum cryptography.
academic
Censorship of Quantum Resources Against Catalytic Account Sharing
In quantum censorship, institutional authorities regulate quantum communication in public quantum networks, restricting user communications to free states within quantum resource theory (QRT). Although quantum correlations are fragile, realistic censorship protocols leave residual quantum properties, raising concerns that censorship could be circumvented through quantum resource revival or distillation. This paper introduces censorship protocols that do not require complete erasure of quantum resources, but instead deem censorship successful when users cannot recover the original quantum state using free operations. The paper investigates under what conditions censorship is secure and when it may fail. Additionally, it addresses the account sharing problem in quantum networks, wherein independent parties assist in transmitting quantum resources to censored users. This connects resource censorship with popular topics such as quantum catalysis and resource-assisted communication.
New Security Challenges in Quantum Networks: As quantum internet develops, how to restrict access to certain quantum resources in public quantum networks becomes an important issue
Limitations of Existing Censorship Methods: Traditional quantum censorship requires complete erasure of quantum resources, but residual quantum properties always remain in practice
Collaborative Attack Threats: Users may circumvent censorship through collaboration or "account sharing" with independent parties
In commercial quantum networks, operators may need to provide tiered services to different users (e.g., restricting ordinary users to classical communication only)
Provides a novel network security perspective distinct from quantum cryptography and post-quantum cryptography
Connects quantum resource theory, quantum catalysis, and other cutting-edge theoretical research
Proposes an Operational Resource Censorship Framework: Does not require perfect filtering, but defines censorship success based on state irrecoverability
Introduces Resource-Reducing Channels: Formally describes operations that preserve free states while degrading resource states
Systematically Analyzes Collaborative Attacks: Studies conditions under which multi-user joint operations circumvent censorship
Addresses Account Sharing Problem: Analyzes the impact of independent parties assisting through quantum catalysis
Concrete Application to Quantum Coherence: Provides complete security analysis for quantum coherence censorship
Input: Quantum states from N senders: ρA1⊗⋯⊗ρANOutput: Quantum state received by recipients after censorship
Constraint: Censorship authority only permits transmission of free states in quantum resource theory
The paper cites 63 related references, covering important works in quantum resource theory, quantum information, quantum network security, and other fields, demonstrating the depth and breadth of the research.