Semantic Security with Infinite Dimensional Quantum Eavesdropping
Channel
- URL: http://arxiv.org/abs/2205.07663v2
- Date: Mon, 5 Jun 2023 12:54:48 GMT
- Title: Semantic Security with Infinite Dimensional Quantum Eavesdropping
Channel
- Authors: Matthias Frey and Igor Bjelakovi\'c and Janis N\"otzel and S{\l}awomir
Sta\'nczak
- Abstract summary: We propose a new proof method for direct coding theorems for wiretap channels.
The method yields errors that decay exponentially with increasing block lengths.
It provides a guarantee of a quantum version of semantic security.
- Score: 19.275181096881454
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We propose a new proof method for direct coding theorems for wiretap channels
where the eavesdropper has access to a quantum version of the transmitted
signal on an infinite-dimensional Hilbert space and the legitimate parties
communicate through a classical channel or a classical input, quantum output
(cq) channel. The transmitter input can be subject to an additive cost
constraint, which specializes to the case of an average energy constraint. This
method yields errors that decay exponentially with increasing block lengths.
Moreover, it provides a guarantee of a quantum version of semantic security,
which is an established concept in classical cryptography and physical layer
security. Therefore, it complements existing works which either do not prove
the exponential error decay or use weaker notions of security. The main part of
this proof method is a direct coding result on channel resolvability which
states that there is only a doubly exponentially small probability that a
standard random codebook does not solve the channel resolvability problem for
the cq channel. Semantic security has strong operational implications meaning
essentially that the eavesdropper cannot use its quantum observation to gather
any meaningful information about the transmitted signal. We also discuss the
connections between semantic security and various other established notions of
secrecy.
Related papers
- Security Enhancement of Quantum Communication in Space-Air-Ground Integrated Networks [7.404591865944407]
Quantum teleportation achieves the transmission of quantum states through quantum channels.
We propose a practical solution that ensures secure information transmission even in the presence of errors in both classical and quantum channels.
arXiv Detail & Related papers (2024-10-22T14:27:21Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - Orthogonality Broadcasting and Quantum Position Verification [3.549868541921029]
Security in quantum cryptographic protocols derives from a possibly weaker property that classical information encoded in certain quantum states cannot be broadcast.
We introduce the study of "orthogonality broadcasting"
arXiv Detail & Related papers (2023-11-01T17:37:20Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Fault-tolerant Coding for Entanglement-Assisted Communication [46.0607942851373]
This paper studies the study of fault-tolerant channel coding for quantum channels.
We use techniques from fault-tolerant quantum computing to establish coding theorems for sending classical and quantum information in this scenario.
We extend these methods to the case of entanglement-assisted communication, in particular proving that the fault-tolerant capacity approaches the usual capacity when the gate error approaches zero.
arXiv Detail & Related papers (2022-10-06T14:09:16Z) - Short Blocklength Wiretap Channel Codes via Deep Learning: Design and
Performance Evaluation [5.203329540700176]
We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees.
We handle the reliability constraint via an autoencoder, and handle the secrecy constraint with hash functions.
For blocklengths smaller than or equal to 16, we evaluate through simulations the probability of error at the legitimate receiver.
arXiv Detail & Related papers (2022-06-07T17:52:46Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Semantic Security for Quantum Wiretap Channels [68.24747267214373]
We consider the problem of semantic security via classical-quantum and quantum wiretap channels.
We use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions.
arXiv Detail & Related papers (2020-01-16T09:55:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.