Secure communication over generalised quantum multiple access channels
- URL: http://arxiv.org/abs/2106.13310v1
- Date: Thu, 24 Jun 2021 20:40:12 GMT
- Title: Secure communication over generalised quantum multiple access channels
- Authors: Tamoghna Das, Karol Horodecki, and Robert Pisarczyk
- Abstract summary: We provide the formula for the achievable rate region of secure communication in the scenario of two senders and a single receiver.
We explicitly specify a protocol for secure communication in this scenario, which employs superdense coding.
We prove the security of the protocol against general quantum attacks, analyze different strategies of the eavesdropper and compute the key rate for a range of noisy quantum channels.
- Score: 1.251280464827565
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We investigate the security of generalized quantum multiple-access channels.
We provide the formula for the achievable rate region of secure communication
in the scenario of two senders and a single receiver. We explicitly specify a
protocol for secure communication in this scenario, which employs superdense
coding. The protocol is based on the distribution of a tripartite GHZ state. It
allows for both symmetric and asymmetric key distribution whereby one of the
senders can have twice the capacity of the other sender. We prove the security
of the protocol against general quantum attacks, analyze different strategies
of the eavesdropper and compute the key rate for a range of noisy quantum
channels.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - Improved Semi-Quantum Key Distribution with Two Almost-Classical Users [1.827510863075184]
We revisit a mediated semi-quantum key distribution protocol introduced by Massa et al.
We show how this protocol may be extended to improve its efficiency and also its noise tolerance.
We evaluate the protocol's performance in a variety of lossy and noisy channels.
arXiv Detail & Related papers (2022-03-20T14:41:14Z) - Security of a High Dimensional Two-Way Quantum Key Distribution Protocol [1.827510863075184]
Two-way quantum key distribution protocols utilize bi-directional quantum communication to establish a shared secret key.
We investigate a high-dimensional variant of the Ping Pong protocol and perform an information theoretic security analysis in the finite-key setting.
arXiv Detail & Related papers (2022-03-06T15:36:54Z) - Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric
Channels [12.576252829963096]
Quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties.
Some QCKA protocols employing twin-field was proposed to promote transmission distance.
Here, we consider a tripartite QCKA protocol utilizing the idea of sending-or-not-sending twin-field scheme.
arXiv Detail & Related papers (2021-09-23T06:36:31Z) - Computation-aided classical-quantum multiple access to boost network
communication speeds [61.12008553173672]
We quantify achievable quantum communication rates of codes with computation property for a two-sender cq-MAC.
We show that it achieves the maximum possible communication rate (the single-user capacity), which cannot be achieved with conventional design.
arXiv Detail & Related papers (2021-05-30T11:19:47Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.