Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

12/05/2018
by   Arash Atashpendar, et al.
0

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/02/2023

New Protocols for Conference Key and Multipartite Entanglement Distillation

We approach two interconnected problems of quantum information processin...
research
01/28/2021

LOCCNet: a machine learning framework for distributed quantum information processing

Distributed quantum information processing is essential for building qua...
research
10/17/2019

Communication over Continuous Quantum Secure Dialogue using Einstein-Podolsky-Rosen States

With the emergence of quantum computing and quantum networks, many commu...
research
03/25/2020

From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography

From the output produced by a memoryless deletion channel with a uniform...
research
09/20/2018

Towards practical key exchange from ordinary isogeny graphs

We revisit the ordinary isogeny-graph based cryptosystems of Couveignes ...
research
11/11/2015

Unifying distillation and privileged information

Distillation (Hinton et al., 2015) and privileged information (Vapnik & ...
research
10/14/2022

Quantum Network Utility Maximization

Network Utility Maximization (NUM) is a mathematical framework that has ...

Please sign up or login with your details

Forgot password? Click here to reset