<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Anna Pappa | LIP6 - Équipe QI</title><link>https://qi.lip6.fr/fr/people/anna-pappa/</link><atom:link href="https://qi.lip6.fr/fr/people/anna-pappa/index.xml" rel="self" type="application/rss+xml"/><description>Anna Pappa</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>fr</language><copyright>© 2022 LIP6 Quantum Information Team</copyright><lastBuildDate>Wed, 01 Jan 2025 00:00:00 +0000</lastBuildDate><image><url>https://qi.lip6.fr/media/icon_hudf2fdaa51677944daa4f50609104ef9a_13950_512x512_fill_lanczos_center_3.png</url><title>Anna Pappa</title><link>https://qi.lip6.fr/fr/people/anna-pappa/</link></image><item><title>Anonymous and private parameter estimation in networks of quantum sensors</title><link>https://qi.lip6.fr/fr/publication/5458726-anonymous-and-private-parameter-estimation-in-networks-of-quantum-sensors/</link><pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/5458726-anonymous-and-private-parameter-estimation-in-networks-of-quantum-sensors/</guid><description>&lt;p>Anonymity and privacy are two key properties of modern communication networks. In quantum networks, distributed quantum sensing has emerged as a powerful use case, with applications to clock synchronisation, detecting gravitational effects and more. In this work, we develop a new protocol that, for the first time, combines the different cryptographic properties of anonymity and privacy for the task of distributed parameter estimation. That is, we present a protocol that allows a selected subset of network participants to anonymously collaborate in estimating the average of their private parameters. Crucially, this is achieved without disclosing either the individual parameter values or the identities of the participants, neither to each other nor to the broader network.&lt;/p></description></item><item><title>Tsirelson's bound and Landauer's principle in a single-system game</title><link>https://qi.lip6.fr/fr/publication/2073839-tsirelson-s-bound-and-landauer-s-principle-in-a-single-system-game/</link><pubDate>Sat, 01 Dec 2018 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2073839-tsirelson-s-bound-and-landauer-s-principle-in-a-single-system-game/</guid><description>&lt;p>We introduce a simple single-system game inspired by the Clauser-Horne-Shimony-Holt (CHSH) game. For qubit systems subjected to unitary gates and projective measurements, we prove that any strategy in our game can be mapped to a strategy in the CHSH game, which implies that Tsirelson&amp;rsquo;s bound also holds in our setting. More generally, we show that the optimal success probability depends on the reversible or irreversible character of the gates, the quantum or classical nature of the system, and the system dimension. We analyze the bounds obtained in light of Landauer&amp;rsquo;s principle, showing the entropic costs of the erasure associated with the game. This demonstrates a connection between the reversibility in fundamental operations embodied by Landauer&amp;rsquo;s principle and Tsirelson&amp;rsquo;s bound that arises from the restricted physics of a unitarily evolving single-qubit system.&lt;/p></description></item><item><title>A Comprehensive Analysis of Quantum E-voting Protocols</title><link>https://qi.lip6.fr/fr/publication/2164606-a-comprehensive-analysis-of-quantum-e-voting-protocols/</link><pubDate>Mon, 27 Aug 2018 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2164606-a-comprehensive-analysis-of-quantum-e-voting-protocols/</guid><description>&lt;p>Recent advances at Google, IBM, as well as a number of research groups indicate that quantum computers will soon be reality. Motivated by the ever more realistic threat quantum computers pose to existing classical cryptographic protocols, researchers have developed several schemes to resist &amp;ldquo;quantum attacks&amp;rdquo;. In particular, for electronic voting, several e-voting schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims which are never formalized and are at best justified only against specific attacks. In this paper, we systematize and evaluate the security of suggested e-voting protocols based on quantum technology. We examine the claims of these works concerning privacy, correctness and verifiability, and if they are correctly attributed to the proposed protocols. In all non-trivial cases, we identified specific quantum attacks that violate these properties. We argue that the cause of these failures lies in the absence of formal security models and in a more general lack of reference to the existing cryptographic literature.&lt;/p></description></item><item><title>Information Theoretically Secure Hypothesis Test for Temporally Unstructured Quantum Computation (Extended Abstract)</title><link>https://qi.lip6.fr/fr/publication/2164421-information-theoretically-secure-hypothesis-test-for-temporally-unstructured-quantum-computation-extended-abstract/</link><pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2164421-information-theoretically-secure-hypothesis-test-for-temporally-unstructured-quantum-computation-extended-abstract/</guid><description/></item><item><title>Classical multiparty computation using quantum resources</title><link>https://qi.lip6.fr/fr/publication/2164423-classical-multiparty-computation-using-quantum-resources/</link><pubDate>Mon, 18 Dec 2017 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2164423-classical-multiparty-computation-using-quantum-resources/</guid><description>&lt;p>In this work, we demonstrate a way to perform classical multiparty computing among parties with limited computational resources. Our method harnesses quantum resources to increase the computational power of the individual parties. We show how a set of clients restricted to linear classical processing are able to jointly compute a nonlinear multivariable function that lies beyond their individual capabilities. The clients are only allowed to perform classical xor gates and single-qubit gates on quantum states. We also examine the type of security that can be achieved in this limited setting. Finally, we provide a proof-of-concept implementation using photonic qubits that allows four clients to compute a specific example of a multiparty function, the pairwise AND.&lt;/p></description></item><item><title>Multiparty Delegated Quantum Computing</title><link>https://qi.lip6.fr/fr/publication/2164529-multiparty-delegated-quantum-computing/</link><pubDate>Sun, 30 Jul 2017 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2164529-multiparty-delegated-quantum-computing/</guid><description/></item></channel></rss>