2022
DOI: 10.1109/tqe.2021.3135077
|View full text |Cite
|
Sign up to set email alerts
|

Long-Term Secure Distributed Storage Using Quantum Key Distribution Network With Third-Party Verification

Abstract: The quantum key distribution (QKD) network [1,2] with Vernam's One Time Pad (OTP) encryption [3] and secret sharing [4] are powerful security tools to realize an information theoretically secure (ITS) distributed storage system. In [5], a single-password-authenticated secret sharing (SPSS) scheme based on the QKD network and Shamir's secret sharing [4] was experimentally demonstrated; it confirmed ITS data transmission, storage, authentication, and integrity. To achieve data integrity, an ITS message authentic… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 26 publications
(54 reference statements)
0
5
0
Order By: Relevance
“…The basic protocol follows our previously proposed protocol [16,17]. This protocol enables a totally information-theoretically secure distributed storage system based on a user-friendly single-passwordauthenticated secret-sharing scheme.…”
Section: Protocol and Simulation Configurationmentioning
confidence: 99%
See 3 more Smart Citations
“…The basic protocol follows our previously proposed protocol [16,17]. This protocol enables a totally information-theoretically secure distributed storage system based on a user-friendly single-passwordauthenticated secret-sharing scheme.…”
Section: Protocol and Simulation Configurationmentioning
confidence: 99%
“…The protocol we have implemented this time is based on what have been published in papers [16,17] so far, so many parts are the same, but in order to explain the protocol correctly, we describe it again.…”
Section: Details Of the Proposed Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Towards the implementation of a one-stop system, for the first step, we developed a method to guarantee the integrity of distributed storage data with information theoretical security by assuming a “trusted share calculator” and a verifier in the quantum secure cloud 35 . In this paper, based on this "trusted server" in the quantum secure cloud concept, we developed an advanced high-performance one-stop system for large-scale genome data analysis with secure secondary use of data to the data owner and multiple users with different levels of data access control.…”
Section: Introductionmentioning
confidence: 99%