All graph state verification protocols are composably secure

Léo Colisson,Damian Markham,Raja Yehia
2024-02-02
Abstract:Graph state verification protocols allow multiple parties to share a graph state while checking that the state is honestly prepared, even in the presence of malicious parties. Since graph states are the starting point of numerous quantum protocols, it is crucial to ensure that graph state verification protocols can safely be composed with other protocols, this property being known as composable security. Previous works [YDK21] conjectured that such a property could not be proven within the abstract cryptography framework: we disprove this conjecture by showing that all graph state verification protocols can be turned into a composably secure protocol with respect to the natural functionality for graph state preparation. Moreover, we show that any unchanged graph state verification protocols can also be considered as composably secure for a slightly different, yet useful, functionality. Finally, we show that these two results are optimal, in the sense that any such generic result, considering arbitrary black-box protocols, must either modify the protocol or consider a different functionality.
Quantum Physics,Cryptography and Security
What problem does this paper attempt to address?
### Problems the Paper Attempts to Solve This paper aims to demonstrate that all graph state verification protocols are composable secure. Specifically: 1. **Defining Ideal Functionality**: The paper defines an ideal functionality `V|G⟩` for verifying graph states. Through this method, any secure graph state verification protocol can be transformed into a composable secure protocol that realizes this ideal functionality. This transformation only adds one round of classical communication at the end of the protocol and essentially retains the guarantees of the original protocol. 2. **Security of Different Functionalities**: The paper also shows that any unmodified graph state verification protocol can be considered as realizing another slightly different but equally useful functionality. Additionally, the authors prove that these results are optimal, meaning that for any general result, if considering any black-box protocol, the protocol or functionality must be modified. 3. **Impossibility Results**: The paper demonstrates that it is impossible to prove that any invariant protocol realizes `V|G⟩` through black-box access alone, unless the protocol or functionality is changed, further validating the optimality of the above results. 4. **Entanglement Swapping Protocol**: The paper also presents a protocol that generalizes entanglement swapping to arbitrary graph states, which may be of independent interest. In summary, the core contribution of the paper is proving that any graph state verification protocol that meets specific security definitions is composable secure, thereby addressing an open problem posed in previous research.