Distributed Information-theoretical Secure Protocols for Quantum Key
Distribution Networks against Malicious Nodes
- URL: http://arxiv.org/abs/2302.07688v5
- Date: Thu, 1 Feb 2024 07:47:36 GMT
- Title: Distributed Information-theoretical Secure Protocols for Quantum Key
Distribution Networks against Malicious Nodes
- Authors: Yi Luo, Qiong Li, Hao-Kun Mao
- Abstract summary: Quantum key distribution (QKD) networks are expected to enable information-theoretical secure (ITS) communication over a large-scale network.
Current research on QKD networks primarily addresses passive attacks conducted by malicious nodes such as eavesdropping.
We suggest a novel paradigm, inspired by distributed systems, to address the active attack by collaborate malicious nodes in QKD networks.
- Score: 15.200383830307915
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) networks are expected to enable
information-theoretical secure (ITS) communication over a large-scale network.
Most researches on relay-based QKD network assume that all relays or nodes are
completely trustworthy. However, the malicious behavior of any single node can
undermine security of QKD networks. Current research on QKD networks primarily
addresses passive attacks conducted by malicious nodes such as eavesdropping.
We suggest a novel paradigm, inspired by distributed systems, to address the
active attack by collaborate malicious nodes in QKD networks. Firstly,
regarding security, we introduce the ITS distributed authentication scheme,
which additionally offers two crucial security properties to QKD networks:
identity unforgeability and non-repudiation. Secondly, concerning correctness,
our ITS fault-tolerant consensus method, ensures ITS and global consistency
with fixed classical broadcast rounds, contrasting with the exponentially
message-intensive Byzantine agreement method. Through our simulation, we have
shown that our scheme exhibits a significantly lower growth trend in
authentication key consumption compared to the original end-to-end pre-shared
keys scheme.
Related papers
- Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies [36.14072181405793]
Low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy.<n>To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity.<n>Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN.
arXiv Detail & Related papers (2025-07-20T04:43:33Z) - Network-wide Quantum Key Distribution with Onion Routing Relay [2.1186715417451207]
Onion Relay (ORR) integrates onion routing with post-quantum cryptography (PQC) in a key-relay (KR) model.<n>ORR provides substantial security improvements without significantly impacting the overall key distribution time.
arXiv Detail & Related papers (2025-05-19T15:21:11Z) - Privacy Enhanced QKD Networks: Zero Trust Relay Architecture based on Homomorphic Encryption [0.0]
Quantum key distribution (QKD) enables unconditionally secure symmetric key exchange between parties.
Traditional solutions rely on trusted relay nodes, which perform intermediate re-encryption of keys using one-time pad (OTP) encryption.
We propose a zero-trust relay design that applies fully homomorphic encryption (FHE) to perform intermediate OTP re-encryption.
arXiv Detail & Related papers (2025-03-21T10:20:06Z) - Onion Routing Key Distribution for QKDN [1.8637078358591843]
The advance of quantum computing poses a significant threat to classical cryptography.
Two main approaches have emerged: quantum cryptography and post-quantum cryptography.
We propose a secure key distribution protocol for Quantum Key Distribution Networks (QKDN)
arXiv Detail & Related papers (2025-02-10T16:47:42Z) - Implementing an information-theoretically secure Byzantine agreement with quantum signed message solution [9.643164830645038]
Byzantine agreement (BA) enables all honest nodes in a decentralized network to reach consensus.
We propose a quantum signed Byzantine agreement (QSBA) protocol based on the quantum signed message (QSM) scheme.
Our protocol achieves information-theoretic security using only QKD-shared key resources between network nodes.
arXiv Detail & Related papers (2025-02-08T10:30:37Z) - Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer [34.46964288961048]
We present a practical implementation of a secure multiparty computation application enabled by quantum oblivious transfer (QOT)<n>The QOT protocol uses polarization-encoded entangled states to share oblivious keys between two parties with quantum key distribution (QKD) providing authentication.<n>A practical use case is demonstrated for privacy-preserving fingerprint matching against no-fly lists from Interpol and the United Nations.
arXiv Detail & Related papers (2025-01-09T15:51:30Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Authentication of quantum key distribution with post-quantum
cryptography and replay attacks [1.8476815769956565]
Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
arXiv Detail & Related papers (2022-06-02T17:29:34Z) - An Information-theoretical Secured Byzantine-fault Tolerance Consensus
in Quantum Key Distribution Network [13.007691543559666]
Quantum key distribution (QKD) networks are expected to provide information-theoretical secured (ITS) communication over long distances.
We propose an ITS Byzantine-fault tolerance (BFT) QKD network scheme to achieve end-to-end key distribution based on point-to-point QKD links.
We theoretically analyze proposed ITSBFT-QKD network scheme from four aspects: QKD key distribution security, temporary signature security, consensus security, and leader election fairness.
arXiv Detail & Related papers (2022-04-21T01:04:39Z) - Practical quantum multiparty signatures using quantum-key-distribution
networks [0.0]
We develop an unconditionally secure signature scheme that guarantees authenticity and transferability of arbitrary length messages in a quantum key distribution network.
We provide a comprehensive security analysis of the developed scheme, perform an optimization of the scheme parameters with respect to the secret key consumption, and demonstrate that the developed scheme is compatible with the capabilities of currently available QKD devices.
arXiv Detail & Related papers (2021-07-27T17:41:40Z) - Feasibility Study for CubeSat Based Trusted Node Configuration Global
QKD Network [0.0]
Quantum key distribution (QKD) is the most used protocol in the context of quantum cryptography.
This paper summarizes technical challenges and possible solutions to enable a global QKD network using CubeSats.
arXiv Detail & Related papers (2021-02-26T15:13:31Z) - Open-destination measurement-device-independent quantum key distribution
network [10.480419551094071]
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities.
Here, we propose an open-destination measurement-device-independent QKD network.
The scheme enjoys security against untrusted relays and all detector side-channel attacks.
arXiv Detail & Related papers (2020-09-28T16:05:32Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.