-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.tex
107 lines (87 loc) · 3.87 KB
/
main.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
\documentclass{article}
\usepackage{amsmath, amssymb, amsthm}
\usepackage{braket}
\usepackage{algorithm}
\usepackage{algpseudocode}
\usepackage{authblk}
\newcommand{\sgn}{\operatorname{sgn}}
\DeclareMathOperator*{\E}{\mathbb{E}}
\DeclareMathOperator*{\spn}{\operatorname{span}}
\newcommand{\norm}[1]{\left\lVert#1\right\rVert}
\newcommand{\algorithmautorefname}{Algorithm}
\usepackage{cite,color,float}
\usepackage[utf8]{inputenc}
\usepackage{tabularx}
\newcommand{\KM}[1]{{\footnotesize\color{cyan}[KM: #1]}}
\newcommand{\Ethan}[1]{{\footnotesize\color{magenta}[Ethan: #1]}}
\newcommand{\Miriam}[1]{{\footnotesize\color{blue}[Miriam: #1]}}
\title{Identifiable Sending}
\author[1]{Bar Alon}
\author[2]{Hao Chung}
\author[3]{Kai-Min Chung}
\author[4]{Mi-Ying Huang}
\author[5]{Yi Lee}
\author[6]{Yu-Ching Shen}
\affil[1]{Ariel University, Israel}
\affil[2, 3, 4, 5, 6]{Institute of Information Science, Academia Sinica, Taiwan}
\input{macros}
\begin{document}
\maketitle
\begin{algorithm}
\caption{Sending a qubit from Alice to Bob, with ability to identify a malicious party}
\label{isalg}
\begin{algorithmic}[1]
\State Create a complete graph $G=(V, E)$ with each vertex corresponding to a player
\State Alice creates a QECC $(\rho_i)$ tolerating $|E|$ errors
\For{$i\gets 1, N$}
\State Choose and agree on a shortest path from Alice to Bob
\If{Path not found}
\State Abort
\State Relays on the same connected component as Alice accuse Bob
\State Other relays accuse Alice
\EndIf
\State send $\rho_i$ along the path
\If{dropped}
\State Remove from $G$ the edge where dropped
\EndIf
\EndFor
\end{algorithmic}
\end{algorithm}
We first prove a theorem that we need, in order to prove the correctness and soundness of the protocol above.
\begin{thm}
Let $G=(V,E)$ be a connected graph. Remove an edge $(v_1, v_2)$ from it to create $G'=(V,E\setminus\set{(v_1, v_2)})$. One of the following is true:
\begin{enumerate}
\item $G'$ is connected
\item $G'$ has two connected components, one containing $v_1$ and the other containing $v_2$
\end{enumerate}
\end{thm}
\begin{proof}
The first case is obvious. So assume case 1 isn't true.
Then $G'$ has at most two connected components, since an edge connects two vertices and therefore putting it back can't rejoin three or more connected components.
Define the following sets
$$C_1=\set{v|v\in G', v \textnormal{ is connected to } v_1}$$
$$C_2=\set{v|v\in G', v \textnormal{ isn't connected to } v_1}$$
It's clear that $C_1\sqcup C_2=V$.
Let $v\in C_2$. Then consider the path from $v$ to $v_1$ in $G$. It must've been broken by the removal of $(v_1, v_2)$; so the path must've crossed through said edge.
Take the partial path with that edge removed and we see that $v$ is connected with $v_2$.
So all vertices in $C_2$ is connected to $v_2$, so $C_2$ forms a connected component that contains $v_2$.
\end{proof}
\begin{cor}
Define $G$ and $G'$ as above.
Let $A, B\in V$, and let $(v_1, v_2)$ be on an acyclic path from $A$ to $B$ in $G$.
Then in case 2, the connected component containing $v_1$ must also contain $A$, and vise versa with $v_2$ and $B$.
\end{cor}
\begin{proof}
Consider the partial paths from $A$ to $B$ with $(v_1, v_2)$ removed.
\end{proof}
\begin{thm}
The above protocol is correct
\end{thm}
\begin{proof}
Completeness: If Alice and Bob are both honest, the shortest path is the one between them and the algorithm will not abort.
Soundness:
According to corollary above, if the algorithm aborts, then the last edge removed must've broken the graph into two connected components.
All honest relays must be on the same connected component, since edges will not be broken between them, so they must accuse the same party.
Their accusation will be correct since the edge directly connecting to each honest party and the one they accuse have been removed, meaning who they accuse must've actually dropped a message.
\end{proof}
\end{document}