Authentication of quantum key distribution with post-quantum
cryptography and replay attacks
- URL: http://arxiv.org/abs/2206.01164v1
- Date: Thu, 2 Jun 2022 17:29:34 GMT
- Title: Authentication of quantum key distribution with post-quantum
cryptography and replay attacks
- Authors: Liu-Jun Wang, You-Yang Zhou, Jian-Ming Yin, and Qing Chen
- Abstract summary: Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
- Score: 1.8476815769956565
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: With the development of quantum computers, traditional cryptographic systems
are facing more and more serious security threats. Fortunately, quantum key
distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic
mechanisms with quantum-resistant security, and both will become important
solutions for future information security. However, neither of them is perfect,
and they are complementary. Quantum key distribution has unconditional security
that post-quantum cryptography does not have, and PQC can provide secure and
convenient authentication for QKD networks. In this paper, we propose two
protocols based on PQC to realize the full authentication of the QKD data
post-processing, and we only need to assume the short-term security of PQC
algorithm to ensure the long-term quantum resistant security of distributed
keys. We found that for the above two authentication protocols, attackers
cannot successfully implement replay attacks. These authentication protocols
can solve the problems of the current pre-shared key authentication in the
application of large-scale quantum key distribution networks, and are expected
to realize a key distribution mechanism with practical operability and quantum
resistant security, which will be beneficial to promote the deployment and
application of quantum key distribution networks.
Related papers
- A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Efficient source-independent quantum conference key agreement [25.617190829449893]
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants.
We propose a source-independent QCKA scheme utilizing the post-matching method.
We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof.
arXiv Detail & Related papers (2024-06-25T04:24:06Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - High-Rate Point-to-Multipoint Quantum Key Distribution using Coherent
States [6.058240259980149]
Quantum key distribution (QKD) which enables information-theoretically security is now heading towards quantum secure networks.
It requires high-performance and cost-effective protocols while increasing the number of users.
Here, we show a 'protocol solution' using continuous-variable quantum information.
arXiv Detail & Related papers (2023-02-05T14:21:33Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Practical quantum multiparty signatures using quantum-key-distribution
networks [0.0]
We develop an unconditionally secure signature scheme that guarantees authenticity and transferability of arbitrary length messages in a quantum key distribution network.
We provide a comprehensive security analysis of the developed scheme, perform an optimization of the scheme parameters with respect to the secret key consumption, and demonstrate that the developed scheme is compatible with the capabilities of currently available QKD devices.
arXiv Detail & Related papers (2021-07-27T17:41:40Z) - Authentication of Metropolitan Quantum Key Distribution Network with
Post-quantum Cryptography [13.937739507933578]
The Jinan field metropolitan QKD network comprised of 14 user nodes and 5 optical switching nodes.
The feasibility, effectiveness and stability of the post-quantum cryptography (PQC) algorithm and advantages of replacing trusted relays with optical switching were verified.
arXiv Detail & Related papers (2021-06-04T12:15:57Z) - Noiseless attack and counterfactual security of quantum key distribution [0.0]
We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
arXiv Detail & Related papers (2020-12-09T16:48:43Z) - Experimental Authentication of Quantum Key Distribution with
Post-quantum Cryptography [3.627592297350721]
We experimentally verified the feasibility, efficiency and stability of the PQC algorithm in QKD authentication.
Using PQC authentication we only need to believe the CA is safe, rather than all trusted relays.
arXiv Detail & Related papers (2020-09-10T04:12:07Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.