2020
DOI: 10.1103/physrevresearch.2.043022
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid quantum network design against unauthorized secret-key generation, and its memory cost

Abstract: A significant number of servers that constitute the Internet are to provide private data via private communication channels to mutually anonymous registered users. Such are the servers of banks, hospitals that provide cloud storage and many others. Replacing communication channels by maximally entangled states is a promising idea for the quantum-secured Internet (QI). While it is an important idea for large distances secure communication, for the case of the mentioned class of servers pure entanglement based s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 35 publications
1
8
0
Order By: Relevance
“…Message rerouting would work as malicious entanglement and may result in inserting incorrect quantum states, thus affecting Integrity and Availability. In a particular configuration of the network, using bounded entanglement state (or low distillation state) we can resist such an attack [95].…”
Section: ) Message Reroutingmentioning
confidence: 99%
“…Message rerouting would work as malicious entanglement and may result in inserting incorrect quantum states, thus affecting Integrity and Availability. In a particular configuration of the network, using bounded entanglement state (or low distillation state) we can resist such an attack [95].…”
Section: ) Message Reroutingmentioning
confidence: 99%
“…A motivation for this and the next Section is given by the fact, that certain private states, as well as states with positive partial transposition that approximate them, are candidates for the hybrid quantum network design [19]. This design ensures that unauthorised key generation will be impossible in quantum networks.…”
Section: Examples Of Action Of Side Channels For Some Private Statesmentioning
confidence: 99%
“…Below we provide such a construction, based on the Calderbank-Shore-Stean (CSS) codes. On the other hand, the private states, allowing to build the hybrid quantum network [19], should have negligible distillable entanglement. Unfortunately, as we show, the CSS-based construction of private states leads to the states with non-vanishing amount of distillable entanglement (see Proposition 3).…”
Section: Secrete Sharing Schemes: Towards Remedy For Leakagementioning
confidence: 99%
See 2 more Smart Citations