Analysis of Multiple Overlapping Paths algorithms for Secure Key
Exchange in Large-Scale Quantum Networks
- URL: http://arxiv.org/abs/2205.03174v1
- Date: Fri, 6 May 2022 12:40:52 GMT
- Title: Analysis of Multiple Overlapping Paths algorithms for Secure Key
Exchange in Large-Scale Quantum Networks
- Authors: Mateusz St\k{e}pniak, Jakub Mielczarek
- Abstract summary: Current implementations of quantum networks are unavoidably equipped with trusted nodes.
Some new authentication and key exchange schemes must be considered to fully benefit from the unconditional security of links.
One such approach uses Multiple Non-Overlapping Paths (MNOPs) for key exchange to mitigate the risk of an attack on a trusted node.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum networks open the way to an unprecedented level of communication
security. However, due to physical limitations on the distances of quantum
links, current implementations of quantum networks are unavoidably equipped
with trusted nodes. As a consequence, the quantum key distribution can be
performed only on the links. Due to this, some new authentication and key
exchange schemes must be considered to fully benefit from the unconditional
security of links. One such approach uses Multiple Non-Overlapping Paths
(MNOPs) for key exchange to mitigate the risk of an attack on a trusted node.
The scope of the article is to perform a security analysis of this scheme for
the case of both uncorrelated attacks and correlated attacks with finite
resources. Furthermore, our analysis is extended to the case of Multiple
Overlapping Paths (MOPs). We prove that introducing overlapping paths allows
one to increase the security of the protocol, compared to the non-overlapping
case with the same number of additional links added. This result may find
application in optimising architectures of large-scale (hybrid) quantum
networks.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Establishing shared secret keys on quantum line networks: protocol and
security [0.0]
We show the security of multi-user key establishment on a single line of quantum communication.
We consider a quantum communication architecture where qubit generation and measurement happen at the two ends of the line.
arXiv Detail & Related papers (2023-04-04T15:35:23Z) - Multi-User Entanglement Distribution in Quantum Networks Using Multipath
Routing [55.2480439325792]
We propose three protocols that increase the entanglement rate of multi-user applications by leveraging multipath routing.
The protocols are evaluated on quantum networks with NISQ constraints, including limited quantum memories and probabilistic entanglement generation.
arXiv Detail & Related papers (2023-03-06T18:06:00Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Quantum communications infrastructure architecture: theoretical
background, network structure and technologies. A review of recent studies
from a European public infrastructure perspective [0.0]
Current technology falls short in several respects of what is required to address use cases well.
Quantum key distribution networks may be classified as trusted node; quantum repeater-entanglement-swapping based.
Both satellite and terrestrial implementations are possible and ore both planned for EU QCI.
arXiv Detail & Related papers (2021-10-13T14:54:04Z) - Sharing classical secrets with continuous-variable entanglement:
Composable security and network coding advantage [0.913755431537592]
We show that multi-partite entangled resources achieve a genuine advantage over point-to-point protocols for quantum communication.
This is the first concrete compelling examples of multi-partite entangled resources achieving a genuine advantage over point-to-point protocols for quantum communication.
arXiv Detail & Related papers (2021-04-21T17:37:28Z) - Scalable authentication and optimal flooding in a quantum network [2.604279577944016]
We consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed.
First, an authentication transfer protocol to manage a fundamental limitation of quantum communication.
Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
arXiv Detail & Related papers (2021-01-28T19:00:07Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.