Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
نویسندگان
چکیده
Abstract Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone insufficient high-security communications. Often, knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here, we experimentally demonstrate five information-theoretically secure anonymity protocols on eight user city-wide quantum network using polarisation entangled photon pairs. At the heart of these anonymous broadcasting, which cryptographic primitive that allows one reveal bit information while keeping their identity anonymous. For n users, retain sender, given no more than − 2 users are colluding. This implementation genuine multi-user beyond standard QKD. Our enhance functionality any fully-connected Quantum Key Distribution without trusted nodes.
منابع مشابه
Multiparty Secure Communication by Using Quantum Key Distribution Protocols
By using the order rearrangement of the single photon sequence and unitary transformations, a mult iparty controlled quantum communication scheme for Carrier Sense Multiple Access with Collision Detection(CSMA/CD) is presented .In this scheme, messages can only be recovered by the receivers with the permission of all controllers .It is shown that the security of messages transformat ion can be ...
متن کاملAn anonymous user identification and key distribution technical protocol
Owing to the dynamic development of the Internet and information technology, user can now access information and services provided by remote service provider through the Internet. The Internet is an open medium of communication; hence, in order to ensure private communication, this study designs an "anonymous user identification protocol" to determine user identities, as well as negotiating a p...
متن کاملQuantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several p...
متن کاملAnonymous key quantum cryptography and unconditionally secure quantum bit commitment
A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is p...
متن کاملHighly Secure Network Switches with Quantum Key Distribution Systems
We have developed network “switches” with security enhanced by “quantum key distribution (QKD) systems”. In a Layer 2 “switch”, media access control (MAC) addresses are encrypted to prevent unauthorized access from internal network. After an initial authentication, common random key bits are shared between the Layer 2 “switch” and users. MAC addresses are encrypted with shared key at every pack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: npj Quantum Information
سال: 2022
ISSN: ['2056-6387']
DOI: https://doi.org/10.1038/s41534-022-00535-1