We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a col...We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones.展开更多
A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the con...A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information.展开更多
Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Auth...Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.展开更多
The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random k...The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system.展开更多
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda...The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory.展开更多
基金supported by the Natural Science Foundation of Jiangsu Provincial Universities (Grant No. 10KJB180004)the National Natural Science Foundation of China (Grant No. 10847147)
文摘We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones.
基金supported by the National Natural Science Foundation of China (61370203)the Science & Technology Pillar Program of Sichuan Province of China (2013GZX0137)the Youth Fund Project of Sichuan Province of China (12ZB017)
文摘A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information.
基金supported by Science and Technology Support Project of Sichuan Province of China (2013GZX0137)Fund for Young Persons Project of Sichuan Province of China (12ZB017)+2 种基金the National Natural Science Foundation of China (61100205)Project of the Fundamental Research Funds for the Central Universities of China (2013RC0307)the Cryptography Basic Development of the National ‘12th Five-Year-Plan’ of China on Cryptographic Theory (MMJJ201301004)
文摘Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.
基金supported by National key research and development program of China, Joint research of IoT security system and key technologies based on quantum key (2020YFE0200600)
文摘The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system.
基金国家重点基础研究发展计划(973计划)(No.2012CB315905)国家自然科学基金(No.61571024+3 种基金No.61272501)北京航空航天大学研究生创新实践基金(No.YCSJ02201512)中央高校基本科研业务费专项资金项目(No.YWF15GJSYS059)Research Promotion Grant-in-Aid for KUT Graduates of Special Scholarship Program
基金funded by the National Key R&D Program of China under Grant 2017YFB0801903the National Natural Science Foundation of China under Grant 61871404,61701538,61521003Doctoral Fund of Ministry of Education of China under Grant 2019M663994。
文摘The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory.