DeepAI AI Chat
Log In Sign Up

Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution

03/27/2020
by   Masahito Hayashi, et al.
nagoya-u.ac.jp
ShanghaiTech University
0

When there exists a malicious attacker in the network, we need to be careful of eavesdropping and contamination. This problem is crucial for network communication when the network is realized by a partially trusted relay of quantum key distribution. We discuss the asymptotic rate in a linear network with the secrecy and robustness conditions when the above type of attacker exists. Also, under the same setting, we discuss the asymptotic rate in a linear network when we impose the secrecy condition alone. Then, we apply these results to the network composed of a partially trusted relay of quantum key distribution, which enables us to realize secure long-distance communication via short-distance quantum key distribution.

READ FULL TEXT

page 1

page 2

page 3

page 4

10/14/2019

Verifiable Quantum Secure Modulo Summation

We propose a new cryptographic task, which we call verifiable quantum se...
06/02/2021

A Reconfigurable Relay for Polarization Encoded QKD Networks

We propose a method for reconfiguring a relay node for polarization enco...
11/06/2021

Long-distance twin-field quantum key distribution with entangled sources

Twin-field quantum key distribution (TFQKD), using single-photon-type in...
03/30/2020

Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

It is natural in a quantum network system that multiple users intend to ...
03/27/2020

Secure network code over one-hop relay network

When there exists a malicious attacker in the network, we need to consid...
03/31/2020

Topological optimization of hybrid quantum key distribution networks

With the rapid development of quantum key distribution (QKD) technology,...
03/26/2020

Reduction Theorem for Secrecy over Linear Network Code for Active Attacks

We discuss the effect of sequential error injection on information leaka...