Quantum Diffie-Hellman key exchange
- URL: http://arxiv.org/abs/2501.09568v1
- Date: Thu, 16 Jan 2025 14:42:11 GMT
- Title: Quantum Diffie-Hellman key exchange
- Authors: Georgios M. Nikolopoulos,
- Abstract summary: We investigate the extension of Diffie-Hellman key exchange to the quantum setting.
The proposed protocol relies on the mapping of integers onto a set of symmetric coherent states.
Its security is analyzed in the framework of minimum-error-discrimination and photon-number-splitting attacks.
- Score: 0.0
- License:
- Abstract: The Diffie-Hellman key exchange plays a crucial role in conventional cryptography, as it allows two legitimate users to establish a common, usually ephemeral, secret key. Its security relies on the discrete-logarithm problem, which is considered to be a mathematical one-way function, while the final key is formed by random independent actions of the two users. In the present work we investigate the extension of Diffie-Hellman key exchange to the quantum setting, where the two legitimate users exchange independent random quantum states. The proposed protocol relies on the bijective mapping of integers onto a set of symmetric coherent states, and we investigate the regime of parameters for which the map behaves as a quantum one-way function. Its security is analyzed in the framework of minimum-error-discrimination and photon-number-splitting attacks, while its performance and the challenges in a possible realization are also discussed.
Related papers
- Unconditionally secure key distribution without quantum channel [0.76146285961466]
Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution.
We propose another key distribution scheme with unconditional security, named probability key distribution, that promises users between any two distances to generate a fixed and high secret key rate.
Non-local entangled states can be generated, identified and measured in the equivalent virtual protocol and can be used to extract secret keys.
arXiv Detail & Related papers (2024-08-24T15:13:14Z) - Complete security analysis of {quantum key distribution} based on
unified model of sequential discrimination strategy [0.0]
We propose a unified model of sequential discrimination including an eavesdropper.
We obtain a non-zero secret key rate between the sender and receiver, which implies that the sender and receiver can share a secret key despite eavesdropping.
arXiv Detail & Related papers (2023-09-26T07:23:34Z) - Encryption with Quantum Public Keys [1.7725414095035827]
We study the question of building quantum public-key encryption schemes from one-way functions and even weaker assumptions.
We propose three schemes for quantum public-key encryption from one-way functions, pseudorandom function-like states with proof of deletion and pseudorandom function-like states, respectively.
arXiv Detail & Related papers (2023-03-09T16:17:19Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Secure distribution of a certified random quantum key using an entangled
memory qubit [0.0]
We produce a certified random secret key on both endpoints of the quantum communication channel.
We certify the randomness of the key using the min-entropy of the atom-photon state.
arXiv Detail & Related papers (2021-11-29T13:31:30Z) - Differential Phase Shift Quantum Secret Sharing Using a Twin Field with
Asymmetric Source Intensities [1.2406207242281755]
We present a differential phase shift quantum secret sharing protocol with asymmetric source intensities.
Taking finite-key effects into account, our protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol.
Our work is meaningful for the real-life applications of quantum secret sharing.
arXiv Detail & Related papers (2021-07-22T05:52:50Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.