Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution

03/27/2020
by   Masahito Hayashi, et al.
0

When there exists a malicious attacker in the network, we need to be careful of eavesdropping and contamination. This problem is crucial for network communication when the network is realized by a partially trusted relay of quantum key distribution. We discuss the asymptotic rate in a linear network with the secrecy and robustness conditions when the above type of attacker exists. Also, under the same setting, we discuss the asymptotic rate in a linear network when we impose the secrecy condition alone. Then, we apply these results to the network composed of a partially trusted relay of quantum key distribution, which enables us to realize secure long-distance communication via short-distance quantum key distribution.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/14/2019

Verifiable Quantum Secure Modulo Summation

We propose a new cryptographic task, which we call verifiable quantum se...
research
06/02/2021

A Reconfigurable Relay for Polarization Encoded QKD Networks

We propose a method for reconfiguring a relay node for polarization enco...
research
11/06/2021

Long-distance twin-field quantum key distribution with entangled sources

Twin-field quantum key distribution (TFQKD), using single-photon-type in...
research
03/30/2020

Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

It is natural in a quantum network system that multiple users intend to ...
research
03/27/2020

Secure network code over one-hop relay network

When there exists a malicious attacker in the network, we need to consid...
research
03/31/2020

Topological optimization of hybrid quantum key distribution networks

With the rapid development of quantum key distribution (QKD) technology,...
research
03/26/2020

Reduction Theorem for Secrecy over Linear Network Code for Active Attacks

We discuss the effect of sequential error injection on information leaka...

Please sign up or login with your details

Forgot password? Click here to reset