{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T00:46:56Z","timestamp":1778028416770,"version":"3.51.4"},"reference-count":50,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T00:00:00Z","timestamp":1579651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR COMB"],"award-info":[{"award-number":["ANR COMB"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>We present a simple protocol for certifying graph states in quantum networks using stabiliser measurements. The certification statements can easily be applied to different protocols using graph states. We see, for example, how it can be used for measurement based verified quantum computation, certified sampling of random unitaries, quantum metrology and sharing quantum secrets over untrusted channels.<\/jats:p>","DOI":"10.3390\/cryptography4010003","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T11:17:57Z","timestamp":1579691877000},"page":"3","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A Simple Protocol for Certifying Graph States and Applications in Quantum Networks"],"prefix":"10.3390","volume":"4","author":[{"given":"Damian","family":"Markham","sequence":"first","affiliation":[{"name":"Laboratoire d\u2019Informatique de Paris 6, Centre National de la Recherche Scientifique (CNRS), Universit\u00e9 Pierre et Marie Curie (UPMC)-Sorbonne Universites, 75005 Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandra","family":"Krause","sequence":"additional","affiliation":[{"name":"Laboratoire d\u2019Informatique de Paris 6, Centre National de la Recherche Scientifique (CNRS), Universit\u00e9 Pierre et Marie Curie (UPMC)-Sorbonne Universites, 75005 Paris, France"},{"name":"Department of Physics, Freie Universit\u00e4t Berlin, 14195 Berlin, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"062311","DOI":"10.1103\/PhysRevA.69.062311","article-title":"Multiparty entanglement in graph states","volume":"69","author":"Hein","year":"2004","journal-title":"Phys. Rev. A"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"012308","DOI":"10.1103\/PhysRevA.65.012308","article-title":"Quantum error-correcting codes associated with graphs","volume":"65","author":"Schlingemann","year":"2001","journal-title":"Phys. Rev. A"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"5188","DOI":"10.1103\/PhysRevLett.86.5188","article-title":"A one-way quantum computer","volume":"86","author":"Raussendorf","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"042309","DOI":"10.1103\/PhysRevA.78.042309","article-title":"Graph states for quantum secret sharing","volume":"78","author":"Markham","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"210502","DOI":"10.1103\/PhysRevLett.117.210502","article-title":"Experimental ten-photon entanglement","volume":"117","author":"Wang","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1126\/science.1214707","article-title":"Demonstration of blind quantum computing","volume":"335","author":"Barz","year":"2012","journal-title":"Science"},{"key":"ref_7","first-page":"1","article-title":"Experimental demonstration of graph-state quantum secret sharing","volume":"5","author":"Bell","year":"2014","journal-title":"Nat. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"15645","DOI":"10.1038\/ncomms15645","article-title":"Multimode entanglement in reconfigurable graph states using optical frequency combs","volume":"8","author":"Cai","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1038\/nphoton.2013.287","article-title":"Ultra-large-scale continuous-variable cluster states multiplexed in the time domain","volume":"7","author":"Yokoyama","year":"2013","journal-title":"Nat. Photonics"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"e16064","DOI":"10.1038\/lsa.2016.64","article-title":"Path-polarization hyperentangled and cluster states of photons on a chip","volume":"5","author":"Ciampini","year":"2016","journal-title":"Light Sci. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1038\/nature09801","article-title":"An open-system quantum simulator with trapped ions","volume":"470","author":"Barreiro","year":"2011","journal-title":"Nature"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"130506","DOI":"10.1103\/PhysRevLett.106.130506","article-title":"14-qubit entanglement: Creation and coherence","volume":"106","author":"Monz","year":"2011","journal-title":"Phys. Rev. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"180511","DOI":"10.1103\/PhysRevLett.119.180511","article-title":"10-qubit entanglement and parallel logic operations with a superconducting circuit","volume":"119","author":"Song","year":"2017","journal-title":"Phys. Rev. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/ncomms11526","article-title":"Repeated quantum error correction on a continuously encoded qubit by real-time feedback","volume":"7","author":"Cramer","year":"2016","journal-title":"Nat. Commun."},{"key":"ref_15","first-page":"206","article-title":"Quantum tomography","volume":"128","author":"Paris","year":"2003","journal-title":"Adv. Imaging Electron Phys."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"032310","DOI":"10.1103\/PhysRevA.84.032310","article-title":"Entanglement witnesses for graph states: General theory and examples","volume":"84","author":"Jungnitsch","year":"2011","journal-title":"Phys. Rev. A"},{"key":"ref_17","unstructured":"McKague, M. (2011). Self-testing graph states. Conference on Quantum Computation, Communication, and Cryptography, Springer."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"260502","DOI":"10.1103\/PhysRevLett.108.260502","article-title":"Multipartite entanglement verification resistant against dishonest parties","volume":"108","author":"Pappa","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"062321","DOI":"10.1103\/PhysRevA.87.062321","article-title":"Entanglement verification using local unitary stabilizers","volume":"87","author":"Lyons","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"13251","DOI":"10.1038\/ncomms13251","article-title":"Experimental verification of multipartite entanglement in quantum networks","volume":"7","author":"McCutcheon","year":"2016","journal-title":"Nat. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Markham, D., and Marin, A. (2015). Practical Sharing of Quantum Secrets over Untrusted Channels. International Conference on Information Theoretic Security, Springer.","DOI":"10.1007\/978-3-319-17470-9_1"},{"key":"ref_22","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., and Tapp, A. (2002, January 19). Authentication of quantum messages. Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1038\/nature03347","article-title":"Experimental one-way quantum computing","volume":"434","author":"Walther","year":"2005","journal-title":"Nature"},{"key":"ref_24","first-page":"1","article-title":"Experimental demonstration of a graph state quantum error-correction code","volume":"5","author":"Bell","year":"2014","journal-title":"Nat. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Unnikrishnan, A., and Markham, D. (2019). Authenticated teleportation and verification in a noisy network. arXiv.","DOI":"10.1103\/PhysRevA.100.032314"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1007\/s00224-018-9872-3","article-title":"Verification of quantum computation: An overview of existing approaches","volume":"63","author":"Gheorghiu","year":"2019","journal-title":"Theory Comput. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Fitzsimons, J., and Kashefi, E. (2009, January 25\u201327). Universal blind quantum computation. Proceedings of the FOCS\u201909\u201450th Annual IEEE Symposium on Foundations of Computer Science, 2009, Atlanta, GA, USA.","DOI":"10.1109\/FOCS.2009.36"},{"key":"ref_28","unstructured":"Fitzsimons, J.F., and Kashefi, E. (2012). Unconditionally verifiable blind computation. arXiv."},{"key":"ref_29","unstructured":"Hayashi, M., and Hajdusek, M. (2016). Self-guaranteed measurement-based quantum computation. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"220502","DOI":"10.1103\/PhysRevLett.115.220502","article-title":"Verifiable measurement-only blind quantum computing with stabilizer testing","volume":"115","author":"Hayashi","year":"2015","journal-title":"Phys. Rev. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1088\/1367-2630\/9\/6\/199","article-title":"Topological fault-tolerance in cluster state quantum computation","volume":"9","author":"Raussendorf","year":"2007","journal-title":"New J. Phys."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"030301","DOI":"10.1103\/PhysRevA.96.030301","article-title":"Verifiable fault tolerance in measurement-based quantum computation","volume":"96","author":"Fujii","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"200501","DOI":"10.1103\/PhysRevLett.116.200501","article-title":"Derandomizing quantum circuits with measurement-based unitary designs","volume":"116","author":"Turner","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2098","DOI":"10.1126\/science.1090790","article-title":"Pseudo-random unitary operators for quantum information processing","volume":"302","author":"Emerson","year":"2003","journal-title":"Science"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/s00220-004-1087-6","article-title":"Randomizing quantum states: Constructions and applications","volume":"250","author":"Hayden","year":"2004","journal-title":"Commun. Math. Phys."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/s00220-015-2473-y","article-title":"Thermalization and canonical typicality in translation-invariant quantum lattice systems","volume":"340","author":"Adlam","year":"2015","journal-title":"Commun. Math. Phys."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"020301","DOI":"10.1103\/PhysRevA.91.020301","article-title":"Testing randomness with photons by direct characterization of optical t-designs","volume":"91","author":"Matthews","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1088\/1126-6708\/2007\/09\/120","article-title":"Black holes as mirrors: Quantum information in random subsystems","volume":"2007","author":"Hayden","year":"2007","journal-title":"J. High Energy Phys."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"022333","DOI":"10.1103\/PhysRevA.97.022333","article-title":"Efficient quantum pseudorandomness with simple graph states","volume":"97","author":"Mezher","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/s00220-016-2706-8","article-title":"Local random quantum circuits are approximate polynomial-designs","volume":"346","author":"Harrow","year":"2016","journal-title":"Commun. Math. Phys."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"170502","DOI":"10.1103\/PhysRevLett.116.170502","article-title":"Efficient Quantum Pseudorandomness","volume":"116","author":"Harrow","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1038\/nphoton.2011.35","article-title":"Advances in quantum metrology","volume":"5","author":"Giovannetti","year":"2011","journal-title":"Nat. Photonics"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"424006","DOI":"10.1088\/1751-8113\/47\/42\/424006","article-title":"Quantum metrology from a quantum information science perspective","volume":"47","author":"Apellaniz","year":"2014","journal-title":"J. Phys. A Math. Theor."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"012339","DOI":"10.1103\/PhysRevA.94.012339","article-title":"Asymptotic role of entanglement in quantum metrology","volume":"94","author":"Augusiak","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3439","DOI":"10.1103\/PhysRevLett.72.3439","article-title":"Statistical distance and the geometry of quantum states","volume":"72","author":"Braunstein","year":"1994","journal-title":"Phys. Rev. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"062315","DOI":"10.1103\/PhysRevA.82.062315","article-title":"Quantum secret sharing with qudit graph states","volume":"82","author":"Keet","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"060501","DOI":"10.1103\/PhysRevLett.94.060501","article-title":"Detecting genuine multipartite entanglement with two local measurements","volume":"94","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"250403","DOI":"10.1103\/PhysRevLett.111.250403","article-title":"Genuine multipartite Einstein-Podolsky-Rosen steering","volume":"111","author":"He","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"032306","DOI":"10.1103\/PhysRevA.87.032306","article-title":"Entanglement verification and steering when Alice and Bob cannot be trusted","volume":"87","author":"Cavalcanti","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"010402","DOI":"10.1103\/PhysRevLett.115.010402","article-title":"Genuine high-order einstein-podolsky-rosen steering","volume":"115","author":"Li","year":"2015","journal-title":"Phys. Rev. Lett."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/1\/3\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:05:37Z","timestamp":1760364337000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/1\/3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,22]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["cryptography4010003"],"URL":"https:\/\/doi.org\/10.3390\/cryptography4010003","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,22]]}}}