2 research outputs found
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack
In this work, we focus on the classical optical channel having Poissonian
statistical behavior and propose a novel secrecy coding-based physical layer
protocol. Our protocol is different but complementary to both (computationally
secure) quantum immune cryptographic protocols and (information theoretically
secure) quantum cryptographic protocols. Specifically, our (information
theoretical) secrecy coding protocol secures classical digital information bits
at photonic level exploiting the random nature of the Poisson channel.
It is known that secrecy coding techniques for the Poisson channel based on
the classical one-way wiretap channel (introduced by Wyner in 1975) ensure
secret communication only if the mutual information to the eavesdropper is
smaller than that to the legitimate receiver. In order to overcome such a
strong limitation, we introduce a two-way protocol that always ensures secret
communication independently of the conditions of legitimate and eavesdropper
channels. We prove this claim showing rigorous comparative derivation and
analysis of the information theoretical secrecy capacity of the classical
one-way and of the proposed two-way protocols. We also show numerical
calculations that prove drastic gains and strong practical potential of our
proposed two-way protocol to secure information transmission over optical
channels
Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution
When there exists a malicious attacker in the network, we need to be careful
of eavesdropping and contamination. This problem is crucial for network
communication when the network is realized by a partially trusted relay of
quantum key distribution. We discuss the asymptotic rate in a linear network
with the secrecy and robustness conditions when the above type of attacker
exists. Also, under the same setting, we discuss the asymptotic rate in a
linear network when we impose the secrecy condition alone. Then, we apply these
results to the network composed of a partially trusted relay of quantum key
distribution, which enables us to realize secure long-distance communication
via short-distance quantum key distribution.Comment: arXiv admin note: text overlap with arXiv:1703.0072