Skip to content

Position-Based Quantum Cryptography

Awesome Position-Based Quantum Cryptography Awesome

This is a curated list of papers on position-based quantum cryptography (PBQC). The goal is to build a categorised community-driven always up-to-date literature overview of this growing field.

QPV = Quantum Position Verification

QPA = Quantum Position-based Authentication

PB-QKD = Position-based Quantum Key Distribution

Classical Impossibility

  • Position-based cryptography (2009) - Establishes classical impossibility of position-based cryptography in the vanilla model. Explores possibility in the bounded-storage model.

First Protocols

BB84 QPV and Generalisations

f-routing

f-BB84 QPV

Bell QPV

Other protocols

Universal Attacks on QPV

Attacks on classes of unitaries

Ways Around the Universal Attacks on QPV

Conjectured Exponential Lower Bound

Quantum Position-based Authentication

Towards Understanding NLQC

Connection to holography

  • Quantum tasks in holography (2019) - Connects QPV to the AdS/CFT conjecture by noting that a QPV protocol in the bulk must have an equivalent protocol in the boundary. The boundary implementation turns out to be a valid attack on the bulk QPV protocol, implementing it non-locally.
  • Holographic scattering requires a connected entanglement wedge (2020) - Furthers the connection between QPV and holography and estimates the mutual information between the relevant boundary regions. Results based on the conjecture could yield efficient attacks on all QPV protocols due to the results in this paper.
  • Holography as a resource for non-local quantum computation (2022) - Discusses and fills a loophole in the paper one above. Costructs an attacked based on simulating a holographic CFT and argues that, based on some assumptions, any polynomially complex unitary can be efficiently attacked.

Towards Practicality

Experiments