7 research outputs found
Semi-quantum communication: Protocols for key agreement, controlled secure direct communication and dialogue
Semi-quantum protocols that allow some of the users to remain classical are
proposed for a large class of problems associated with secure communication and
secure multiparty computation. Specifically, first time semi-quantum protocols
are proposed for key agreement, controlled deterministic secure communication
and dialogue, and it is shown that the semi-quantum protocols for controlled
deterministic secure communication and dialogue can be reduced to semi-quantum
protocols for e-commerce and private comparison (socialist millionaire
problem), respectively. Complementing with the earlier proposed semi-quantum
schemes for key distribution, secret sharing and deterministic secure
communication, set of schemes proposed here and subsequent discussions have
established that almost every secure communication and computation tasks that
can be performed using fully quantum protocols can also be performed in
semi-quantum manner. Further, it addresses a fundamental question in context of
a large number problems- how much quantumness is (how many quantum parties are)
required to perform a specific secure communication task? Some of the proposed
schemes are completely orthogonal-state-based, and thus, fundamentally
different from the existing semi-quantum schemes that are
conjugate-coding-based. Security, efficiency and applicability of the proposed
schemes have been discussed with appropriate importance.Comment: 19 pages 1 figur
Quantum walks-based simple authenticated quantum cryptography protocols for secure wireless sensor networks
Wireless sensor networks play a crucial role in various applications, ranging from environmental monitoring to industrial automation that require high levels of security. With the development of quantum technologies, many security mechanisms maybe hacked due to the promising capabilities of quantum computation. To address this challenge, quantum protocols have emerged as a promising solution for enhancing the security of wireless sensor communications. One of the common types of quantum protocols is quantum key distribution (QKD) protocols, which are investigated to allow two participants with fully quantum capabilities to share a random secret key, while semi-quantum key distribution (SQKD) protocols are designed to perform the same task using fewer quantum resources to make quantum communications more realizable and practical. Quantum walk plays an essential role in quantum computing, which is a universal quantum computational paradigm. In this work, we utilize the advantages of quantum walk to design three authenticated quantum cryptographic protocols to establish secure channels for data transmission between sensor nodes: the first one is authenticated quantum key distribution (AQKD), the second one is authenticated semi quantum key distribution (ASQKD) with one of the two participants having limited quantum capabilities, and the last one is authenticated semi-quantum key distribution but both legitimate users possess limited quantum resources. The advantages of the proposed protocols are that the partners can exchange several different keys with the same exchanged qubits, and the presented protocols depend on a one-way quantum communication channel. In contrast, all previously designed SQKD protocols rely on two-way quantum communication. Security analyses prove that the presented protocols are secure against various well known attacks and highly efficient. The utilization of the presented protocols in wireless sensor communications opens up new avenues for secure and trustworthy data transmission, enabling the deployment of resilient wireless sensor networks in critical applications. This work also paves the way for future exploration of quantum-based security protocols and their integration into wireless sensor networks for enhanced data protection
Semi-Quantum Conference Key Agreement (SQCKA)
A need in the development of secure quantum communications is the scalable extension
of key distribution protocols. The greatest advantage of these protocols is the fact that its
security does not rely on mathematical assumptions and can achieve perfect secrecy. In
order to make these protocols scalable, has been developed the concept of Conference
Key Agreements, among multiple users.
In this thesis we propose a key distribution protocol among several users using a
semi-quantum approach. We assume that only one of the users is equipped with quantum
devices and generates quantum states, while the other users are classical, i.e., they are only
equipped with a device capable of measuring or reflecting the information. This approach has
the advantage of simplicity and reduced costs.
We prove our proposal is secure and we present some numerical results on the lower
bounds for the key rate. The security proof applies new techniques derived from some
already well established work.
From the practical point of view, we developed a toolkit called Qis|krypt⟩ that is able to
simulate not only our protocol but also some well-known quantum key distribution protocols.
The source-code is available on the following link:
- https://github.com/qiskrypt/qiskrypt/.Uma das necessidades no desenvolvimento de comunicações quânticas seguras é a extensão
escalável de protocolos de distribuição de chaves. A grande vantagem destes protocolos é o
facto da sua segurança não depender de suposições matemáticas e poder atingir segurança
perfeita. Para tornar estes protocolos escaláveis, desenvolveu-se o conceito de Acordo
de Chaves de Conferência, entre múltiplos utilizadores.
Nesta tese propomos um protocolo para distribuição de chaves entre vários utilizadores
usando uma abordagem semi-quântica. Assumimos que apenas um dos utilizadores está
equipado com dispositivos quânticos e é capaz de gerar estados quânticos, enquanto que
os outros utilizadores são clássicos, isto é, estão apenas equipados com dispositivos capazes
de efectuar uma medição ou refletir a informação. Esta abordagem tem a vantagem de ser
mais simples e de reduzir custos.
Provamos que a nossa proposta é segura e apresentamos alguns resultados numéricos
sobre limites inferiores para o rácio de geração de chaves. A prova de segurança aplica novas
técnicas derivadas de alguns resultados já bem estabelecidos.
Do ponto de vista prático, desenvolvemos uma ferramenta chamada Qis|krypt⟩ que é capaz
de simular não só o nosso protocolo como também outros protocolos distribuição de chaves
bem conhecidos. O código fonte encontra-se disponÃvel no seguinte link:
- https://github.com/qiskrypt/qiskrypt/