5,706 research outputs found
Efficient quantum direct communication with authentication
Two protocols of quantum direct communication with authentication [Phys. Rev.
A 73, 042305(2006)] were recently indicated to be insecure against the
authenticator Trent's attacks [Phys. Rev. A 75, 026301(2007)]. We present two
efficient protocols by using four Pauli operations, which are secure against
inner Trent's attacks as well as outer Eve's attacks. Finally, we generalize
them to multiparty quantum direction communication.Comment: 4 pages, 4 table
Energy efficient mining on a quantum-enabled blockchain using light
We outline a quantum-enabled blockchain architecture based on a consortium of
quantum servers. The network is hybridised, utilising digital systems for
sharing and processing classical information combined with a fibre--optic
infrastructure and quantum devices for transmitting and processing quantum
information. We deliver an energy efficient interactive mining protocol enacted
between clients and servers which uses quantum information encoded in light and
removes the need for trust in network infrastructure. Instead, clients on the
network need only trust the transparent network code, and that their devices
adhere to the rules of quantum physics. To demonstrate the energy efficiency of
the mining protocol, we elaborate upon the results of two previous experiments
(one performed over 1km of optical fibre) as applied to this work. Finally, we
address some key vulnerabilities, explore open questions, and observe
forward--compatibility with the quantum internet and quantum computing
technologies.Comment: 25 pages, 5 figure
Practical cryptographic strategies in the post-quantum era
We review new frontiers in information security technologies in
communications and distributed storage technologies with the use of classical,
quantum, hybrid classical-quantum, and post-quantum cryptography. We analyze
the current state-of-the-art, critical characteristics, development trends, and
limitations of these techniques for application in enterprise information
protection systems. An approach concerning the selection of practical
encryption technologies for enterprises with branched communication networks is
introduced.Comment: 5 pages, 2 figures; review pape
A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography
In this work we review the security vulnerability of Quantum Cryptography
with respect to "man-in-the-middle attacks" and the standard authentication
methods applied to counteract these attacks. We further propose a modified
authentication algorithm which features higher efficiency with respect to
consumption of mutual secret bits.Comment: 4 pages, submitted to the International Journal of Quantum
Information, Proceedings of the meeting "Foundations of Quantum Information",
Camerino, April 200
- …