Experimental implementation of secure anonymous protocols on an
eight-user quantum network
- URL: http://arxiv.org/abs/2011.09480v1
- Date: Wed, 18 Nov 2020 19:00:01 GMT
- Title: Experimental implementation of secure anonymous protocols on an
eight-user quantum network
- Authors: Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda
O. Quintavalle, Natarajan Venkatachalam, S\"oren Wengerowsky, Martin
Lon\v{c}ari\'c, Sebastian Philipp Neumann, Bo Liu, \v{Z}eljko Samec, Laurent
Kling, Mario Stip\v{c}evi\'c, Rupert Ursin, John G. Rarity
- Abstract summary: We experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network.
For a network of $n$ users, the protocols retain anonymity for the sender, given less than $n-2$ users are dishonest.
- Score: 2.5516484173114855
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Anonymity in networked communication is vital for many privacy-preserving
tasks. Secure key distribution alone is insufficient for high-security
communications, often knowing who transmits a message to whom and when must
also be kept hidden from an adversary. Here we experimentally demonstrate 5
information-theoretically secure anonymity protocols on an 8 user city-wide
quantum network using polarisation-entangled photon pairs. At the heart of
these protocols is anonymous broadcasting, which is a cryptographic primitive
that allows one user to reveal one bit of information while keeping her
identity anonymous. For a network of $n$ users, the protocols retain anonymity
for the sender, given less than $n-2$ users are dishonest. This is one of the
earliest implementations of genuine multi-user cryptographic protocols beyond
standard QKD. Our anonymous protocols enhance the functionality of any
fully-connected Quantum Key Distribution network without trusted nodes.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Pudding: Private User Discovery in Anonymity Networks [9.474649136535705]
Pudding is a novel private user discovery protocol.
It hides contact relationships between users, prevents impersonation, and conceals which usernames are registered on the network.
Pudding can be deployed on Loopix and Nym without changes to the underlying anonymity network protocol.
arXiv Detail & Related papers (2023-11-17T19:06:08Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Unconditionally secure digital signatures implemented in an 8-user
quantum network [2.6625873540051033]
We present an experimental demonstration of an unconditionally secure digital signature protocol.
Our USS protocol is secure against forging, repudiation and messages are transferrable.
We show the feasibility of unconditionally secure signatures using only bi-partite entangled states distributed throughout the network.
arXiv Detail & Related papers (2022-02-09T18:58:38Z) - Secure Anonymous Conferencing in Quantum Networks [0.0]
We introduce a security framework for anonymous conference key agreement with different levels of anonymity.
We present efficient and noise-tolerant protocols exploiting multipartite Greenberger-Horne-Zeilinger (GHZ) states.
Our results strongly advocate the use of multipartite entanglement for cryptographic tasks involving several users.
arXiv Detail & Related papers (2021-11-09T19:09:34Z) - Anonymous and secret communication in quantum networks [0.0]
We implement an anonymous quantum conference key agreement by sharing multipartite entangled states in a quantum network.
We demonstrate the protocol with four parties and establish keys in subsets of the network.
We additionally show that the protocol is verifiable and run multiple key generation and verification routines.
arXiv Detail & Related papers (2021-03-15T21:07:25Z) - Quantum Anonymity for Quantum Networks [10.355938901584565]
We present the first quantum anonymous notification protocol (QAN)
QAN protocol paves the way for anonymous secure quantum communication in quantum networks.
We propose an anonymous quantum private comparison protocol in an $n$-node quantum network.
arXiv Detail & Related papers (2020-07-22T02:59:32Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z) - Experimental quantum conference key agreement [55.41644538483948]
Quantum networks will provide multi-node entanglement over long distances to enable secure communication on a global scale.
Here we demonstrate quantum conference key agreement, a quantum communication protocol that exploits multi-partite entanglement.
We distribute four-photon Greenberger-Horne-Zeilinger (GHZ) states generated by high-brightness, telecom photon-pair sources across up to 50 km of fibre.
arXiv Detail & Related papers (2020-02-04T19:00:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.