Design and analysis of a set of discrete variable protocols for secure quantum communication
- URL: http://arxiv.org/abs/2508.06380v1
- Date: Fri, 08 Aug 2025 15:12:29 GMT
- Title: Design and analysis of a set of discrete variable protocols for secure quantum communication
- Authors: Arindam Dutta,
- Abstract summary: quantum identity authentication (QIA) protocols have been proposed over the past three decades.<n>This thesis presents two novel QKD protocols that eliminate the need for entanglement or ideal single-photon sources.<n>These protocols are rigorously proven to be secure against various attacks, including intercept-resend and certain collective attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The advent of quantum key distribution (QKD) has revolutionized secure communication by providing unconditional security, unlike classical cryptographic methods. However, its effectiveness relies on robust identity authentication, as vulnerabilities in the authentication process can cause a compromise with the security of the entire communication system. Over the past three decades, numerous quantum identity authentication (QIA) protocols have been proposed. This thesis first presents a chronological review of these protocols, categorizing them based on quantum resources and computational tasks involved while analyzing their strengths and limitations. Subsequently, by recognizing inherent symmetries present in the existing protocols, we design novel QIA schemes based on secure computational and communication tasks. Specifically, this work introduces a set of new QIA protocols that utilize controlled secure direct quantum communication. The proposed scheme facilitates mutual authentication between two users, Alice and Bob, with assistance from a third party, Charlie, using Bell states. A comprehensive security analysis demonstrates its robustness against impersonation, intercept-resend, and fraudulent authentication attacks. The comparative evaluation highlights its advantages over existing schemes. Additionally, this thesis presents two novel QKD protocols that eliminate the need for entanglement or ideal single-photon sources, making them feasible with commercially available photon sources. These protocols are rigorously proven to be secure against various attacks, including intercept-resend and certain collective attacks. Key rate bounds are established, demonstrating that specific classical pre-processing enhances the tolerable error threshold. PHD THESIS
Related papers
- Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs [0.0]
Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption.<n>Security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols.<n>Most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations.
arXiv Detail & Related papers (2026-02-04T21:16:33Z) - Verifier-initiated quantum message-authentication via quantum zero-knowledge proofs [38.81686642226027]
We introduce a new method where the verifier can request authentication only when needed, improving efficiency for quantum networks and blockchain applications.<n>Our approach adapts the concept of zero-knowledge widely used in classical cryptography to quantum settings, ensuring that verification reveals nothing about secret keys.<n>This work delivers the first general verifier-initiated quantum signature scheme with formal security, paving the way for scalable, secure authentication in future quantum infrastructures and decentralized systems.
arXiv Detail & Related papers (2025-12-05T04:40:34Z) - Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer [34.46964288961048]
We present a practical implementation of a secure multiparty computation application enabled by quantum oblivious transfer (QOT)<n>The QOT protocol uses polarization-encoded entangled states to share oblivious keys between two parties with quantum key distribution (QKD) providing authentication.<n>A practical use case is demonstrated for privacy-preserving fingerprint matching against no-fly lists from Interpol and the United Nations.
arXiv Detail & Related papers (2025-01-09T15:51:30Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Simultaneous quantum identity authentication scheme utilizing entanglement swapping with secret key preservation [0.0]
We introduce a new protocol for quantum identity authentication (QIA)<n>Our proposed scheme facilitates simultaneous authentication between two users, Alice and Bob, leveraging Bell states with the assistance of a third party, Charlie.<n>We demonstrate that the proposed protocol withstands various known attacks, including impersonation, intercept and resend and impersonated fraudulent attacks.
arXiv Detail & Related papers (2024-05-23T18:40:15Z) - A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Security of differential phase shift QKD from relativistic principles [1.0515831025408138]
This work presents the first full security proof of DPS QKD against general attacks.<n>The proof combines techniques from quantum information theory, quantum optics, and relativity.<n>Our results shed light on the range of applicability of state-of-the-art security proof techniques.
arXiv Detail & Related papers (2023-01-26T19:00:00Z) - A short review on quantum identity authentication protocols: How would
Bob know that he is talking with Alice? [0.0]
Successful implementation of a scheme of quantum key distribution (QKD) requires identity authentication as a prerequisite.
Several schemes for identity authentication, using quantum resources have been proposed.
The security of such protocols is also critically analyzed.
arXiv Detail & Related papers (2021-12-08T11:22:29Z) - Twin-field quantum digital signatures [4.503555294002338]
Digital signature is a key technique in information security, especially for identity authentications.
Quantum digital signatures (QDSs) provide a considerably higher level of security, i.e., information-theoretic security.
arXiv Detail & Related papers (2020-03-25T08:04:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.