4.7 Article

Concealed Quantum Telecomputation for Anonymous 6G URLLC Networks

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSAC.2023.3280989

关键词

6G; blind quantum computation; counterfactual quantum communication; distributed learning; quantum anonymous networks; ultra-reliable and low-latency communication

向作者/读者索取更多资源

Distributed learning and multi-tier computing are crucial for achieving ultra-reliable and low-latency communication in 6G networks. The transition from connected things in 5G URLLC networks to connected intelligence in 6G URLLC networks requires secure communication due to the large amount of private data involved. This paper proposes a distributed quantum computation protocol integrated with anonymous quantum communication networks to ensure strict 6G URLLC requirements while maintaining user privacy and data security.
Distributed learning and multi-tier computing are the key ingredients to ensure ultra-reliable and low-latency communication (URLLC) in 6G networks. The distinct transition from connected things in 5G URLLC networks to connected intelligence in 6G URLLC networks requires ultra-secure communication due to the massive amount of private data. However, it is a challenging task to ensure stringent 6G URLLC requirements along with user privacy and data security in distributed networks. In this paper, we devise a distributed quantum computation protocol to perform a nonlocal controlled unitary operation on a bipartite input state in concealed and counterfactual manner and integrate it with anonymous quantum communication networks. This distributed protocol allows Bob to apply an arbitrary singlequbit unitary operator on Alice's qubit in a controlled and probabilistic fashion, without revealing the operator to her and without transmitting any physical particle over the quantum channel-called the counterfactual concealed telecomputation (CCT). It is shown that the CCT protocol neither requires the preshared entanglement nor depends on the bipartite input state and that the single-qubit unitary teleportation is a special case of CCT. The quantum circuit for CCT can be implemented using the (chained) quantum Zeno gates. The protocol becomes deterministic with simplified circuit implementation if the initial composite state of Alice and Bob is a Bell-type state. Furthermore, we provide numerical examples of quantum anonymous broadcast networks using the CCT protocol and show their degrees of anonymity in the presence of malicious users.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据