When quantum communication networks proliferate they will likely be subject to a new type of attack by hackers, virus makers, and other malicious intruders. Here we introduce the concept of “quantum malware” to describe such human-made intrusions. We offer a simple solution for storage of quantum information in a manner, which protects quantum networks from quantum malware. This solution involves swapping the quantum information at random times between the network and isolated, distributed ancillas. It applies to arbitrary attack types, provided the protective operations are themselves not compromised.
Similar content being viewed by others
References
Nielsen M.A., Chuang I.L. (2000). Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK
Dowling J.P., Milburn G.J. (2003). Phil. Trans. R. Soc. (Lond.) 361: 1655
C. Elliott, eprint quant-ph/0412029.
Steane A.M. (1999). Nature 399: 124
Cleve R., Gottesman D., Lo H.-K. (1999). Phys. Rev. Lett. 83: 648
Shor P.W., Preskill J. (2000). Phys. Rev. Lett. 85: 441
See, e.g., http://en.wikipedia.org/wiki/Malware.
Nielsen M.A., Chuang I.L. (1997). Phys. Rev. Lett. 79: 321
Vidal G., Masanes L., Cirac J.I. (2002). Phys. Rev. Lett. 88: 047905
Rosko M., Buzek V., Chouha P.R., Hillery M. (2003). Phys. Rev. A 68: 062302
Fiurasek J., Dusek M. (2004). Phys. Rev. A 69: 032302
D’Ariano G.M., Perinotti P. (2005). Phys. Rev. Lett. 94: 090401
Wootters W.K., Zurek W.H. (1982). Nature 299: 802
Dieks D. (1982). Phys. Lett. A 92: 271
Deutsch D. (1989). Proc. R. Soc. Lond. Ser. A 425: 73
Kraus K. (1983). States, Effects and Operations, Fundamental Notions of Quantum Theory. Academic, Berlin
H. Barnum et al., in Proc. 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS’02) (IEEE Press, 2002).
Gottesman D., Lo H.-K. (2000). Phys. Today 53: 22
Bennett C.H., Brassard G., Crépeau C., Jozsa R., Peres A., Wootters W.K. (1993). Phys. Rev. Lett. 70: 1895
Giovannetti V., Lloyd S., Maccone S.L. (2001). Nature 412: 417
Blakely G. (1979). Proc. AFIPS Nat. Comput. Conf. 48: 313
Shamir A. (1979). Comm. Assoc. Comput. Mach. 22: 612
Gottesman D. (2000). Phys. Rev. A 61: 042311
Hillery M., Buzek V., Berthiaume A. (1999). Phys. Rev. A 59: 1829
Karlsson A., Koashi M., Imoto N. (1999) Phys. Rev. A 59: 162
Hamburger D.A., Biham O., Avnir D. (1996). Phys. Rev. E 53: 3342
Wu L.-A., Lidar D.A. (2004). Phys. Rev. A 70: 062310
Loss D., DiVincenzo D.P. (1998). Phys. Rev. A 57: 120
Burkard G., Loss D., DiVincenzo D.P. (1999). Phys. Rev. B 59: 2070
Lidar D.A., Wu L.-A. (2002). Phys. Rev. Lett. 88: 017905
Bonesteel N.E., Stepanenko D., DiVincenzo D.P. (2001). Phys. Rev. Lett. 87: 207901
Chen P., Piermarocchi C., Sham L.J. (2001). Phys. Rev. Lett. 87: 067401
Biolatti E., Iotti R.C., Zanardi P., Rossi F. (2000). Phys. Rev. Lett. 85: 5647
Platzman P.M., Dykman M.I. (1999). Science 284: 1967
Knill E., Laflamme R., Milburn G.J. (2001). Nature 409: 46
Viola L.J. (2004) Mod. Optics 51: 2357
Facchi P., Tasaki S., Pascazio S., Nakazato H., Tokuse A., Lidar D.A. (2005). Phys. Rev. A 71: 022302
D. A. Lidar and K. B. Whaley, in Irreversible Quantum Dynamics, Vol. 622 of Lecture Notes in Physics (Springer, Berlin, 2003), p. 83. Eprint quant-ph/0301032.
Lo H.-K., Chau H.F. (1999). Science 283: 2050
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, LA., Lidar, D. Quantum Malware. Quantum Inf Process 5, 69–81 (2006). https://doi.org/10.1007/s11128-006-0014-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-006-0014-5