45 research outputs found
A verifiable quantum key agreement protocol based on six-qubit cluster states
Quantum key agreement requires all participants to recover the shared key
together, so it is crucial to resist the participant attack. In this paper, we
propose a verifiable multi-party quantum key agreement protocol based on the
six-qubit cluster states. A verifiable distributor who preserves some
subsequences of the six-qubit cluster states is introduced into this protocol,
thus the participants can not obtain the shared key in advance. Besides, the
correctness and simultaneity of the shared key are guaranteed by the trusted
design combiner and homomorphic hash function. Furthermore, the security
analysis shows that the new protocol can resist the external and internal
attacks.Comment: 9 pages, 2 figure
Semi-Quantum Conference Key Agreement (SQCKA)
A need in the development of secure quantum communications is the scalable extension
of key distribution protocols. The greatest advantage of these protocols is the fact that its
security does not rely on mathematical assumptions and can achieve perfect secrecy. In
order to make these protocols scalable, has been developed the concept of Conference
Key Agreements, among multiple users.
In this thesis we propose a key distribution protocol among several users using a
semi-quantum approach. We assume that only one of the users is equipped with quantum
devices and generates quantum states, while the other users are classical, i.e., they are only
equipped with a device capable of measuring or reflecting the information. This approach has
the advantage of simplicity and reduced costs.
We prove our proposal is secure and we present some numerical results on the lower
bounds for the key rate. The security proof applies new techniques derived from some
already well established work.
From the practical point of view, we developed a toolkit called Qis|krypt⟩ that is able to
simulate not only our protocol but also some well-known quantum key distribution protocols.
The source-code is available on the following link:
- https://github.com/qiskrypt/qiskrypt/.Uma das necessidades no desenvolvimento de comunicações quânticas seguras é a extensão
escalável de protocolos de distribuição de chaves. A grande vantagem destes protocolos é o
facto da sua segurança não depender de suposições matemáticas e poder atingir segurança
perfeita. Para tornar estes protocolos escaláveis, desenvolveu-se o conceito de Acordo
de Chaves de Conferência, entre múltiplos utilizadores.
Nesta tese propomos um protocolo para distribuição de chaves entre vários utilizadores
usando uma abordagem semi-quântica. Assumimos que apenas um dos utilizadores está
equipado com dispositivos quânticos e é capaz de gerar estados quânticos, enquanto que
os outros utilizadores são clássicos, isto é, estão apenas equipados com dispositivos capazes
de efectuar uma medição ou refletir a informação. Esta abordagem tem a vantagem de ser
mais simples e de reduzir custos.
Provamos que a nossa proposta é segura e apresentamos alguns resultados numéricos
sobre limites inferiores para o rácio de geração de chaves. A prova de segurança aplica novas
técnicas derivadas de alguns resultados já bem estabelecidos.
Do ponto de vista prático, desenvolvemos uma ferramenta chamada Qis|krypt⟩ que é capaz
de simular não só o nosso protocolo como também outros protocolos distribuição de chaves
bem conhecidos. O código fonte encontra-se disponível no seguinte link:
- https://github.com/qiskrypt/qiskrypt/
Quantum nonlocality, cryptography and complexity
Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue
Cybersecurity and Quantum Computing: friends or foes?
L'abstract è presente nell'allegato / the abstract is in the attachmen
The Statistics and Security of Quantum Key Distribution
In this work our aim has been to elucidate our theoretical developments that bolster the efficiency of quantum key distribution systems leading to more secure communication channels, as well as develop rigorous methods for their analysis. After a review of the necessary mathematical and physical preliminaries and a discussion of the present state of quantum communication technologies, we begin by investigating the Trojan Horse Attack, a form of side-channel attack that could threaten the security of existing key distribution protocols. We examine the secret key rates that may be achieved when an eavesdropper may use any Gaussian state in the presence of thermal noise, and prove that the coherent state is optimal in this case. We then allow the eavesdropper to use any separable state, and show that this gives a key rate bound close to that of the coherent state.
We develop a protocol for a quantum repeater that makes use of the double-heralding procedure for entanglement-generation. In our analysis, we include statistical effects on the key rate arising from probabilistic entanglement generation, which results in some quantum memories decohering while other sections complete their entanglement generation attempts. We show that this results in secure communication being possible over thousands of kilometres, allowing for intercontinental key distribution.
Finally, we investigate in more depth the statistical issues that arise in general quantum repeater networks. We develop a framework based on Markov chains and probability generating functions, to show how one may easily calculate an analytic expression for the completion time of a probabilistic process. We then extend this method to show how one may track the distribution of the number of errors that accrue in operating such a process. We apply these methods to a typical quantum repeater network to get new tight bounds on the achievable key rates
Quantum Cryptography: Key Distribution and Beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Quanta 2017; 6: 1–47
Quantum Entanglement in Time
In this doctoral thesis we provide one of the first theoretical expositions
on a quantum effect known as entanglement in time. It can be viewed as an
interdependence of quantum systems across time, which is stronger than could
ever exist between classical systems. We explore this temporal effect within
the study of quantum information and its foundations as well as through
relativistic quantum information. An original contribution of this thesis is
the design of one of the first applications of entanglement in time.Comment: 271 pages, PhD Thesis (Victoria University of Wellington