Skip to main content

2018 | OriginalPaper | Buchkapitel

Revisiting Deniability in Quantum Key Exchange

via Covert Communication and Entanglement Distillation

verfasst von : Arash Atashpendar, G. Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arrazola, J.M., Scarani, V.: Covert quantum communication. Phys. Rev. Lett. 117(25), 250503 (2016)CrossRef Arrazola, J.M., Scarani, V.: Covert quantum communication. Phys. Rev. Lett. 117(25), 250503 (2016)CrossRef
2.
Zurück zum Zitat Bash, B.A., Goeckel, D., Towsley, D., Guha, S.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRef Bash, B.A., Goeckel, D., Towsley, D., Guha, S.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRef
4.
Zurück zum Zitat Bennett, C.H., Bernstein, H.J., Popescu, S., Schumacher, B.: Concentrating partial entanglement by local operations. Phys. Rev. A 53(4), 2046 (1996)CrossRef Bennett, C.H., Bernstein, H.J., Popescu, S., Schumacher, B.: Concentrating partial entanglement by local operations. Phys. Rev. A 53(4), 2046 (1996)CrossRef
5.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 (1984)
6.
Zurück zum Zitat Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)MathSciNetCrossRef Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)MathSciNetCrossRef
7.
Zurück zum Zitat Bennett, C.H., Brassard, G., Popescu, S., Schumacher, B., Smolin, J.A., Wootters, W.K.: Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett. 76(5), 722 (1996)CrossRef Bennett, C.H., Brassard, G., Popescu, S., Schumacher, B., Smolin, J.A., Wootters, W.K.: Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett. 76(5), 722 (1996)CrossRef
8.
Zurück zum Zitat Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54(5), 3824 (1996)MathSciNetCrossRef Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54(5), 3824 (1996)MathSciNetCrossRef
9.
Zurück zum Zitat Buscemi, F., Datta, N.: Distilling entanglement from arbitrary resources. J. Math. Phys. 51(10), 102–201 (2010)MathSciNetCrossRef Buscemi, F., Datta, N.: Distilling entanglement from arbitrary resources. J. Math. Phys. 51(10), 102–201 (2010)MathSciNetCrossRef
10.
Zurück zum Zitat Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54(2), 1098 (1996)CrossRef Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54(2), 1098 (1996)CrossRef
13.
Zurück zum Zitat Cremers, C., Feltz, M.: One-round strongly secure key exchange with perfect forward secrecy and deniability. Technical report, ETH Zurich (2011) Cremers, C., Feltz, M.: One-round strongly secure key exchange with perfect forward secrecy and deniability. Technical report, ETH Zurich (2011)
14.
Zurück zum Zitat Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 461(2053), 207–235 (2005)MathSciNetCrossRef Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 461(2053), 207–235 (2005)MathSciNetCrossRef
15.
Zurück zum Zitat Di Raimondo, M., Gennaro, R.: New approaches for deniable authentication. J. Cryptol. 22(4), 572–615 (2009)MathSciNetCrossRef Di Raimondo, M., Gennaro, R.: New approaches for deniable authentication. J. Cryptol. 22(4), 572–615 (2009)MathSciNetCrossRef
16.
Zurück zum Zitat Di Raimondo, M., Gennaro, R., Krawczyk, H.: Deniable authentication and key exchange. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 400–409. ACM (2006) Di Raimondo, M., Gennaro, R., Krawczyk, H.: Deniable authentication and key exchange. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 400–409. ACM (2006)
18.
Zurück zum Zitat Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, STOC 1998, pp. 409–418. ACM, New York (1998) Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, STOC 1998, pp. 409–418. ACM, New York (1998)
19.
21.
Zurück zum Zitat Koashi, M., Winter, A.: Monogamy of quantum entanglement and other correlations. Phys. Rev. A 69(2), 022309 (2004)MathSciNetCrossRef Koashi, M., Winter, A.: Monogamy of quantum entanglement and other correlations. Phys. Rev. A 69(2), 022309 (2004)MathSciNetCrossRef
22.
Zurück zum Zitat Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050–2056 (1999)CrossRef Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050–2056 (1999)CrossRef
23.
25.
Zurück zum Zitat Nielsen, M.A., Chuang, I.: Quantum Computation and Quantum Information (2002) Nielsen, M.A., Chuang, I.: Quantum Computation and Quantum Information (2002)
27.
Zurück zum Zitat Sheikholeslami, A., Bash, B.A., Towsley, D., Goeckel, D., Guha, S.: Covert communication over classical-quantum channels. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 2064–2068. IEEE (2016) Sheikholeslami, A., Bash, B.A., Towsley, D., Goeckel, D., Guha, S.: Covert communication over classical-quantum channels. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 2064–2068. IEEE (2016)
28.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)CrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)CrossRef
29.
Zurück zum Zitat Steane, A.: Multiple-particle interference and quantum error correction. Proc. R. Soc. Lond. A 452(1954), 2551–2577 (1996)MathSciNetCrossRef Steane, A.: Multiple-particle interference and quantum error correction. Proc. R. Soc. Lond. A 452(1954), 2551–2577 (1996)MathSciNetCrossRef
30.
Zurück zum Zitat Streltsov, A., Adesso, G., Piani, M., Bruß, D.: Are general quantum correlations monogamous? Phys. Rev. Lett. 109(5), 050503 (2012)CrossRef Streltsov, A., Adesso, G., Piani, M., Bruß, D.: Are general quantum correlations monogamous? Phys. Rev. Lett. 109(5), 050503 (2012)CrossRef
31.
Zurück zum Zitat Unger, N., Goldberg, I.: Deniable key exchanges for secure messaging. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1211–1223. ACM (2015) Unger, N., Goldberg, I.: Deniable key exchanges for secure messaging. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1211–1223. ACM (2015)
32.
Zurück zum Zitat Wilde, M.M.: Quantum Information Theory. Cambridge University Press, New York (2013) Wilde, M.M.: Quantum Information Theory. Cambridge University Press, New York (2013)
33.
Zurück zum Zitat Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)CrossRef Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)CrossRef
Metadaten
Titel
Revisiting Deniability in Quantum Key Exchange
verfasst von
Arash Atashpendar
G. Vamsi Policharla
Peter B. Rønne
Peter Y. A. Ryan
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-03638-6_7

Premium Partner