Security amplification of the ping-pong protocol with many-qubit Greenberger-Horne-Zeilinger states

Authors

  • Yevhen Vasiliu Odessa State University named after I.I. Mechnikov
  • Sergiy Gnatyuk National Aviation University
  • Sergiy Nikolayenko Odessa National Academy of Telecommunications named after О.S. Popov
  • Tetiana Zhmurko National Aviation University

DOI:

https://doi.org/10.18372/2225-5036.18.3470

Keywords:

ping-pong protocol, Greenberger-Horne-Zeilinger states, qubit

Abstract

In this paper the non-quantum method of security amplification for the ping-pong protocol with many-qubit entangled Greenberger-Horne-Zeilinger states (GHZ-states) is proposed. This method can be used in quantum cryptography and consists in invertible hashing of classical message blocks. The necessary sizes of matrices for hashing of message blocks are calculated at some values of the protocol parameters. The proposed method does not require the presence from legitimate users of any pre-established keys. Thus, the main advantage of the quantum secure direct communication protocols, namely the lack of necessity to distribute of secret key remains valid at usage of the proposed method.

Author Biographies

Yevhen Vasiliu, Odessa State University named after I.I. Mechnikov

Date and place of birth: 1966, Yalta, Crimea, Ukraine.

Education: Odessa State University named after I.I. Mechnikov, 1990.

Current position & Functions: Full Professor at Automation Dept since 2012.

Research interests: quantum cryptography, quantum key distribution protocols, quantum secure direct communication, error correction coding for quantum cryptography protocols, quantum steganography.

Publications: over 100 scientific publications including papers, conference proceedings, patents.

Sergiy Gnatyuk, National Aviation University

Date and place of birth: 1985, Netishyn, Khmelnytskyi Oblast, Ukraine.

Education: National Aviation University, 2007.

Current position & Functions: Associate Professor at IT-Security Dept since 2012.

Research interests: information & aviation security, quantum cryptography, information security incident management, cyber threats to international civil aviation.

Publications: over 90 scientific publications including monograph, papers in domestic & foreign scientific journals, international conferences proceedings, patents & certificates of copyright registration etc.

Sergiy Nikolayenko, Odessa National Academy of Telecommunications named after О.S. Popov

Date and place of birth: 1983, Odessa, Ukraine.

Education: Odessa National Academy of Telecommunications named after О.S. Popov, 2005.

Current position & Functions: Lecturer at IT Dept.

Research interests: quantum cryptography, quantum secure direct communication, web-programming, functional programming.

Publications: over 30 scientific publications including papers, conference proceedings, international conferences materials, patents.

Tetiana Zhmurko, National Aviation University

Date and place of birth: 1990, Vinnitsa, Ukraine.

Education: National Aviation University, 2012.

Current position & Functions: Postgraduate student.

Research interests: quantum cryptography,  cyber threats to international civil aviation.

Publications: over 10 scientific publications including papers, conference proceedings, international conferences materials, patents.

References

E.V. Vasiliu. Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits // Quantum Information Processing. – 2011. – V. 10, num. 2. – P. 189–202.

O.G. Korchenko, Ye.V. Vasiliu, S.O. Gnatyuk. Modern directions of quantum cryptography // Proceedings of the fourth world congress "Aviation in the XXI-st century" – "Safety in Aviation and Space Technologies". – Kyiv, 2010. – V. 1. – P. 17.1–17.4.

O. Korchenko, P. Vorobiyenko, M. Lutskiy, Ye. Vasiliu and S. Gnatyuk. Quantum Secure Telecommunication Systems // Telecommunications Networks – Current Status and Future Trends (Edited by J.H. Ortiz). – InTech, 2012. – P. 211–236.

O. Korchenko, Ye. Vasiliu, S. Gnatyuk. Modern quantum technologies of information security against cyber-terrorist attacks // Aviation. Vilnius: Technika. – 2010. – Vol. 14, no. 2. – P. 58–69.

K. Bostrom, T. Felbinger: Deterministic secure direct communication using entanglement. – Physical Review Letters. – 2002. – V. 89. – 187902.

F.G. Deng, G.L. Long, X.S. Liu. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block // Physical Review A. – 2003. – V. 68. – 042317.

E.V. Vasiliu: Analysis of attack on the ping-pong protocol with Greenberger-Horne-Zeilinger triplets // Scientific works of the Odessa national academy of telecomm. n.a. O.S. Popov. – 2008, issue 1. – P. 15–24.

E.V. Vasiliu: Asymptotic security of the ping-pong quantum direct communication protocol with three-qubit Greenberger–Horne–Zeilinger states // Georgian Electronic Scientific Journal: Comp. Sc. and Telecomm. – 2009, issue 3 (20). – P. 3–15. http://gesj.internet-academy.org.ge/gesj_articles/1427. pdf.

E.V. Vasiliu, S.V. Nikolaenko: Synthesis of the secure system of direct messages transfer based on the ping-pong protocol of quantum communication // Scientific works of the Odessa national academy of telecomm. n.a. O.S. Popov. – 2009, issue 1. – P. 83–91. http://nbuv.gov.ua/portal/natural/Nponaz/2009_1/files/20091_VasiliyNikolaenko.pdf

J. Overbey, W. Traves, J. Wojdylo. On the keyspace of the Hill cipher // Cryptologia. – 2005. – V. 29. – P. 59–72.

Published

2012-12-17

Issue

Section

Cryptology