Research

Paper

TESTING February 26, 2026

Cryptographic Fragility of Standard Quantum Repeater Protocols

Authors

Abhishek Sadhu, Sharu Theresa Jose

Abstract

The security of the proposed quantum Internet relies on repeater protocols designed under the assumption of stochastic, characterizable noise. We demonstrate that in adversarial environments this assumption induces performance vulnerabilities for computationally bounded repeater nodes. We show that the standard BBPSSW distillation protocol recursively purifies error syndromes rather than entanglement. This leads to a state of low fidelity despite diagnostic metrics indicating perfect convergence. Moreover, we show that the verifier cannot check the adversarial influence via the maximum likelihood estimation algorithm since it is blind to computationally bounded observers. To address these vulnerabilities, we propose a Cryptographic Network Stack centered on a trapdoor verification protocol. The protocol exploits private randomness to restore operational stability without requiring channel characterization.

Metadata

arXiv ID: 2602.23048
Provider: ARXIV
Primary Category: quant-ph
Published: 2026-02-26
Fetched: 2026-02-27 04:35

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2602.23048v1</id>\n    <title>Cryptographic Fragility of Standard Quantum Repeater Protocols</title>\n    <updated>2026-02-26T14:30:03Z</updated>\n    <link href='https://arxiv.org/abs/2602.23048v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2602.23048v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>The security of the proposed quantum Internet relies on repeater protocols designed under the assumption of stochastic, characterizable noise. We demonstrate that in adversarial environments this assumption induces performance vulnerabilities for computationally bounded repeater nodes. We show that the standard BBPSSW distillation protocol recursively purifies error syndromes rather than entanglement. This leads to a state of low fidelity despite diagnostic metrics indicating perfect convergence. Moreover, we show that the verifier cannot check the adversarial influence via the maximum likelihood estimation algorithm since it is blind to computationally bounded observers. To address these vulnerabilities, we propose a Cryptographic Network Stack centered on a trapdoor verification protocol. The protocol exploits private randomness to restore operational stability without requiring channel characterization.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='quant-ph'/>\n    <published>2026-02-26T14:30:03Z</published>\n    <arxiv:comment>7 pages. Comments are welcome</arxiv:comment>\n    <arxiv:primary_category term='quant-ph'/>\n    <author>\n      <name>Abhishek Sadhu</name>\n    </author>\n    <author>\n      <name>Sharu Theresa Jose</name>\n    </author>\n  </entry>"
}