Secure multiparty quantum key agreement against collusive attacks
- URL: http://arxiv.org/abs/2004.11738v3
- Date: Wed, 21 Jun 2023 14:22:33 GMT
- Title: Secure multiparty quantum key agreement against collusive attacks
- Authors: Hussein Abulkasim, Atefeh Mashatan, Shohini Ghose
- Abstract summary: Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs.
In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants.
In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key agreement enables remote participants to fairly establish a
secure shared key based on their private inputs. In the circular-type
multiparty quantum key agreement mode, two or more malicious participants can
collude together to steal private inputs of honest participants or to generate
the final key alone. In this work, we focus on a powerful collusive attack
strategy in which two or more malicious participants in particular positions,
can learn sensitive information or generate the final key alone without
revealing their malicious behaviour. Many of the current circular-type
multiparty quantum key agreement protocols are not secure against this
collusive attack strategy. As an example, we analyze the security of a recently
proposed multiparty key agreement protocol to show the vulnerability of
existing circular-type multiparty quantum key agreement protocols against this
collusive attack. Moreover, we design a general secure multiparty key agreement
model that would remove this vulnerability from such circular-type key
agreement protocols and describe the necessary steps to implement this model.
The proposed model is general and does not depend on the specific physical
implementation of the quantum key agreement.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - An Efficient and Multi-private Key Secure Aggregation for Federated Learning [41.29971745967693]
We propose an efficient and multi-private key secure aggregation scheme for federated learning.
Specifically, we skillfully modify the variant ElGamal encryption technique to achieve homomorphic addition operation.
For the high dimensional deep model parameter, we introduce a super-increasing sequence to compress multi-dimensional data into 1-D.
arXiv Detail & Related papers (2023-06-15T09:05:36Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Security of quantum key distribution from generalised entropy
accumulation [2.1030878979833467]
We provide a formal framework for general quantum key distribution protocols.
We show that security against general attacks reduces to security against collective attacks.
Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation.
arXiv Detail & Related papers (2022-03-09T19:00:07Z) - Authenticated Multiparty Quantum Key Agreement for Optical-Ring Quantum
Communication Networks [7.753213765615376]
In the key agreement protocols, an attacker can impersonate a legal user to participate in the negotiation process and eavesdrop the agreement key easily.
This is often overlooked in most quantum key agreement protocols, which makes them insecure in practical implementation.
Considering this problem, the function of authenticating the user's identity is added in the proposed protocol.
arXiv Detail & Related papers (2021-12-15T07:16:09Z) - Multi-party quantum key agreement protocol with authentication [16.298896422265297]
A multi-party quantum key agreement protocol with authentication is proposed.
Classical hash function and Hadamard operation are utilized to authenticate the identity of participants.
The security of this protocol against common attacks is analyzed.
arXiv Detail & Related papers (2021-03-23T01:12:55Z) - Double C-NOT attack on a single-state semi-quantum key distribution
protocol and its improvement [0.20767168898581634]
An eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants.
This study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants.
arXiv Detail & Related papers (2020-09-26T08:29:26Z) - A verifiable quantum key agreement protocol based on six-qubit cluster
states [14.148375496762261]
A verifiable distributor who preserves some subsequences of the six-qubit cluster states is introduced into this protocol.
The correctness and simultaneity of the shared key are guaranteed by the trusted design combiner and homomorphic hash function.
arXiv Detail & Related papers (2020-06-23T04:04:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.