Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
It is a standard result in the theory of quantum error- correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and encoded Hilbert spaces. However, this bound only applies to codes which recover the message exactly. Naively, one might expect that correcting errors to very high fidelity would only allow small violations of this bound. This intuition is incorrect: in this paper we describe quantum error-correcting codes capable of correcting up to \(\lfloor(n - 1)/2\rfloor\) arbitrary errors with fidelity exponentially close to 1, at the price of increasing the size of the registers (i.e., the coding alphabet). This demonstrates a sharp distinction between exact and approximate quantum error correction. The codes have the property that any t components reveal no information about the message, and so they can also be viewed as error-tolerant secret sharing schemes.
The construction has several interesting implications for cryptography and quantum information theory. First, it suggests that secret sharing is a better classical analogue to quantum error correction than is classical error correction. Second, it highlights an error in a purported proof that verifiable quantum secret sharing (VQSS) is impossible when the number of cheaters t is n/4. In particular, the construction directly yields an honest-dealer VQSS scheme for \(t= \lfloor(n - 1)/2\rfloor\). We believe the codes could also potentially lead to improved protocols for dishonest-dealer VQSS and secure multi-party quantum computation.
More generally, the construction illustrates a difference between exact and approximate requirements in quantum cryptography and (yet again) the delicacy of security proofs and impossibility results in the quantum model.
- 1.Aharonov, D., Ben-Or, M.: Fault tolerant quantum computation with constant error rate. Submitted to SIAM J. Comp. (June 1999) (Preliminary version in STOC 29th 1997)Google Scholar
- 2.Barnum, H., Crépeau, C., Gottesman, D., Tapp, A., Smith, A.: Authentication of quantum messages. In: Proceedings of The 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2002), Vancouver, BC, Canada, November 16 - 19, pp. 449–458 (2002); Also Quantum Physics, abstract quant-ph/0205128, p. 22 (May 2002)Google Scholar
- 7.Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., Rabin, T.: Efficient Multiparty Computations Secure Against an Adaptive Adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 311. Springer, Heidelberg (1999)Google Scholar
- 9.Crépeau, C., Gottesman, D., Smith, A.: Secure multi-party quantum computation. In: Proceedings of 34th Annual ACM Symposium on Theory of Computing, Montréal, Québec, Canada, May 19-21, pp. 643–652. ACM Press, New York (2002)Google Scholar
- 10.Gemmell, P., Naor, M.: Codes for interactive authentication. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 355–367. Springer, Heidelberg (1994)Google Scholar
- 11.Gottesman, D.: An Introduction to Quantum Error Correction., Quantum Physics, abstract quant-ph/0004072, 15 pages, talk given at AMS Short Course on Quantum ComputationGoogle Scholar
- 12.Hayden, P., Leung, D., Mayers, D.: Universally composable quantum authentication (in preparation)Google Scholar
- 15.Leung, D.W., Nielsen, M.A., Chuang, I.L., Yamamoto, Y.: Approximate quantum error correction can lead to better codes. Phys.Rev. A56, 2567–2573 (1997); quant-ph/9704002 Google Scholar
- 18.Oppenheim, J., Horodecki, M.: How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information. E-print quant-ph/0306161Google Scholar
- 19.Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: Proc. of STOC 1989, pp. 73–85 (1989)Google Scholar
- 21.Schumacher, B., Westmoreland, M.D.: Approximate quantum error correction. E-print quant-ph/0112106 (2001)Google Scholar
- 22.Smith, A.: Quantum secret sharing for general access structures. E-print quant-ph/0001087 (2000)Google Scholar
- 23.Srinathan, K., Narayanan, A., Pandu Rangan, C.: Optimal Perfectly Secure Message Transmission. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 545–561. Springer, Heidelberg (2004)Google Scholar