5,114 research outputs found
A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator
We propose a novel source based on a dual-drive modulator that is adaptable
and allows Alice to choose between various practical quantum key distribution
(QKD) protocols depending on what receiver she is communicating with.
Experimental results show that the proposed transmitter is suitable for
implementation of the Bennett and Brassard 1984 (BB84), coherent one-way (COW)
and differential phase shift (DPS) protocols with stable and low quantum bit
error rate. This could become a useful component in network QKD, where
multi-protocol capability is highly desirable.Comment: 15 pages, 7 figure
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Scalable Group Secret Key Generation over Wireless Channels
In this paper, we consider the problem of secret key generation for multiple
parties. Multi-user networks usually require a trusted party to efficiently
distribute keys to the legitimate users and this process is a weakness against
eavesdroppers. With the help of the physical layer security techniques, users
can securely decide on a secret key without a trusted party by exploiting the
unique properties of the channel. In this context, we develop a physical layer
group key generation scheme that is also based on the ideas of the analog
function computation studies. We firstly consider the key generation as a
function to be computed over the wireless channel and propose two novel methods
depending on the users transmission capability (i.e. half-duplex and
full-duplex transmissions). Secondly, we exploit the uniqueness of the prime
integers in order to enable the simultaneous transmission of the users for key
generation. As a result, our approach contributes to the scalability of the
existing physical layer key generation algorithms since all users transmit
simultaneously rather than using pairwise communications. We prove that our
half-duplex network model reduces the required number of communications for
group key generation down to a linear scale. Furthermore, the full-duplex
network model reduces to a constant scale.Comment: 7 pages, 3 figure, transaction
Quantum enigma machines and the locking capacity of a quantum channel
The locking effect is a phenomenon which is unique to quantum information
theory and represents one of the strongest separations between the classical
and quantum theories of information. The Fawzi-Hayden-Sen (FHS) locking
protocol harnesses this effect in a cryptographic context, whereby one party
can encode n bits into n qubits while using only a constant-size secret key.
The encoded message is then secure against any measurement that an eavesdropper
could perform in an attempt to recover the message, but the protocol does not
necessarily meet the composability requirements needed in quantum key
distribution applications. In any case, the locking effect represents an
extreme violation of Shannon's classical theorem, which states that
information-theoretic security holds in the classical case if and only if the
secret key is the same size as the message. Given this intriguing phenomenon,
it is of practical interest to study the effect in the presence of noise, which
can occur in the systems of both the legitimate receiver and the eavesdropper.
This paper formally defines the locking capacity of a quantum channel as the
maximum amount of locked information that can be reliably transmitted to a
legitimate receiver by exploiting many independent uses of a quantum channel
and an amount of secret key sublinear in the number of channel uses. We provide
general operational bounds on the locking capacity in terms of other well-known
capacities from quantum Shannon theory. We also study the important case of
bosonic channels, finding limitations on these channels' locking capacity when
coherent-state encodings are employed and particular locking protocols for
these channels that might be physically implementable.Comment: 37 page
- …