Generalized classification of modern quantum cryptography and communication methods
DOI:
https://doi.org/10.18372/2225-5036.21.9706Keywords:
quantum cryptography, classification, quantum secure direct communication, quantum key distribution, quantum teleportation, quantum game theory, quantum digital signatureAbstract
Modern powerful computing technology development threatens the confidentiality of information that usually provided by traditional cryptographic means and forces researchers to look for alternative security methods. Given the current trends, these alternatives may be quantum cryptography and communication methods. These methods unlike traditional (classical) analogues use specific unique properties of quantum particles and are based on the inviolability of the quantum physics laws. Existing classifications in quantum cryptography and communications do not include the large number of modern methods. It complicates its study and use in the quantum information security systems development. In the paper modern methods of quantum cryptography and communication were analyzed, their advantages and disadvantages, security assessment to various kinds of cyberattacks were defined, and also the existing classifications of these methods were studied. On the basis of partial generalizations of theoretical positions and practical advances in quantum cryptography, the generalized classification of quantum cryptography and communication methods was constructed. This classification reveals a problem in this area and can extend the possibilities for choosing the appropriate methods for modern quantum information security systems development.References
Лимарь И.В., Василиу Е.В. Классификация квантовых технологий разделения секрета / Захист інформації. – Том 16. – №3. – 2014 – C. 201-214.
Chenmiao W., Li Ya. A complete Classifi-cation of Quantum Public-key Encryption Protocols Available from: http://arxiv.org/pdf/ 1507.03765v2.pdf
Chong X., Li Y., Yong P. Dongqing Chen The Classification of Quantum Symmetric-Key Encryption Protocols. Available from: http://arxiv.org/pdf/1006.4216.pdf
Hassanpour S., Houshmand M. Bidirectional quantum teleportation and secure direct communication via entanglement swapping. Available from http://arxiv.org/ftp/arxiv/papers/1411/1411.0206.pdf
Xiaoqing T. Introduction to Quantum Crypto-graphy (part of Theory and Practice of Cryptography and Network Security Protocols and Technol.) Available from http://cdn.intechopen.com/pdfs-wm/43793.pdf
D’ariano G.M. Quantum bit commitment: a complete classification of protocols. Available from http://www.qubit.it/research/publications/0209150.pdf
Korchenko O., Vasiliu E., Gnatyuk S. Modern quantum technologies of information security, Aviation. Vilnius: Technika, Vol. 14, No. 2, 2010, p. 58-69.
Кузнецова А.В. Стратегии атак на кванто-вые протоколы защиты информации. – Цифрові технології. – № 14. – 2013. – С. 134-137.
Scarani V., Ribordy G., Gisin N. Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations. Available from: http://www.unige.ch/gap/quantum/ _media/publications:bib: prl57901.pdf
Корченко А.Г. Методы перехвата инфор-мации в информационно-коммуникационных системах на основе квантових технологий / А.Г. Корченко, Е.В. Василиу, Т.А. Жмурко, С.А. Гнатюк // Моногра-фия. – Х. : Цифрова друкарня. – № 1, 2013. – C. 98-110.
Waks E. Security of Quantum Key Distribution with Entangled Photons Against Individual Attacks / E. Waks, A. Zeevi, Y. Yamamoto // Physical Review A. – 2002. – V. 65, issue 5. – 052310.
Василиу Е.В. Анализ атаки на пинг – понг протокол с триплетами Гринбергера-Хорна-Цайлингера / Е.В. Василиу // Наукові праці ОНАЗ ім. О.С. Попова. – 2008. – № 1. – С. 15-24.
Василиу Е.В. Анализ атаки пассивного перехвата на пинг-понг протокол с полностью перепутанными парами кутритов / Е.В. Василиу, Р.С. Мамедов // Восточноевропейский журнал передовых технологий. – 2009. – № 4/2 (40). – С. 4-11.
Василиу Е.В. Анализ атаки двух злоумыш-ленников на протокол квантовой прямой безопасной связи / Е.В. Василиу, С.В. Николаенко // Труды Северо-Кавказ. фил. МТУСИ. – 2013. – C. 324-330.
Suzuki S., Rodney V. Classification of Quan-tum Repeater Attacks. Available from: www.internetsociety.org/sites/default/files/01_2_3.pdf
Jain N., Anisimova E., Khan I. et al. Trojan-horse attacks threaten the security of practical quantum cryptography. Available from http://iopscience.iop. org/1367-2630/16/12 /123 030
Scarani V. et al. The security of practical quantum key distribution, Avail. from: http://quic.ulb. ac.be/_media/publications/2009-rmp-81-001301.pdf
Shukla C., Banerjee A., Pathak A. Secure Quantum Communication with Orthogonal States Available from: http://arxiv.org/pdf/1407.3412.pdf
Cutolo A., Mignani A.G., Tajani A. Photonics for safety and security, World Scientific Publishing Co. Pte. Ltd. – Singapore. – 2014. – 422 p.
Cerf N.J., Leuchs G., Polzik E.S. Quantum information with CV of atoms and Light, Imperial College Press, 2007. – 604 p.
Bennett C.H., Brassard G. Quantum crypto-graphy: public key distribution and coin tossing // Proceedings of the IEEE Intern. Conf. on Comp., Syst. and Signal Proces. – Bangalore, India. – 1984. – P. 175-179.
Bruss D. Optimal Eavesdropping in Quan-tum Cryptography with Six States // Physical Review Letters. – 1998. – V. 81, № 14. – P. 3018-3021.
Huttner B., Imoto N., Gisin N., Mor T. Quantum Cryptography with Coherent States // Physical Review A. – 1995. – V. 51, № 3. – P. 1863-1869.
Goldenberg L., Vaidman L. Quantum Cryptography Based On Orthogonal States // Physical Review Letters. – 1995. – V. 75, № 7. – P. 1239-1243.
Koashi M., Imoto N. Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps, Phys. Rev.Let., 1997, V. 79, № 12, P. 2383-2386.
Bennett C.H. Quantum cryptography using any two non-orthogonal states // Physical Review Letters. – 1992. – V. 68, № 21. – P. 3121–3124.
Ekert A. Quantum cryptography based on Bell's theorem, Phys. Rev. Let., 1991, V. 67, № 6, P.661-663.
Wang X.-B. Comment on Decoy State Quantum Key Distribution // arXiv:quant-ph/0501143
Scarani V., Acin A., Ribordy G., Gisin N., Phys. Rev. Lett. 92, 2004, 057901.
Gisin N. et al., Rev. Mod. Phys., 74, 2002, P.145-195.
Khan M.M., Murphy M., Beige A. High error-rate quantum key distribution for long-distance communication Available from: http://iopscience. iop.org/ article/10.1088/1367-2630/11/6/063043/pdf
Chuan W., Fu Guo D., Gui Lu L. Multi-step quantum secure direct communication using multi-particle Greenberg-Horne-Zeilinger state. – Optics Communications. – 2005. – V. 253. – P. 15-19.
Bostrom K., Felbinger T. Deterministic secure direct communication using entanglement // Physical Review Letters. – 2002. – V. 89, № 18. – 187902.
Cai Q.-Y., Li B.-W. Improving the capacity of the Bostrom – Felbinger protocol // Physical Review A. – 2004. – V. 69, № 5. – 054301.
Василиу Е.В., Василиу Л.Н. Пинг-понг протокол с трех– и четырехкубитными состояниями Гринбергера-Хорна-Цайлингера // Труды Одес-ского политех. ун-та. – 2008. – Вып. 1(29). – С. 171-176.
Wang Ch., Deng F.-G., Li Y.-S. et al. Quantum secure direct communication with high dimension quantum superdense coding // Physical Review A. – 2005. – V. 71, № 4. – 044305.
Нильсен М., Чанг И. Квантовые вычис-ления и квантовая информация. – М.: Мир, 2006. – 824 с.
Стин Э. Квантовые вычисления. Перевод с английского И.Д. Пасынкова: НИЦ «Регулярная и хаотическая динамика», М. – Ижевск, 2000. – 111 с.
Yan F.-L., Gao T., Li Yu.-Ch. Quantum secret sharing protocol between multiparty and multiparty with single photons and unitary transformations // Chinese Phys.Let. – 2008. – V. 25, № 4. – P. 1187 – 1190
Yuen H. P. KCQ: A New Approach to Quantum Cryptography I. General Principles and Key Generation // arXiv:quant-ph/0311061
Nair R., Yuen H.P. On the Security of the Y-00 Direct Encryption Protocol // arXiv:quant-ph/0702093v2
Hirota O., Kurosawa K. An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol // arXiv:quant-ph/0604036v1
Hassanpour S., Houshmand M. Bidirectional quantum teleportation and secure direct communication via entanglement swapping http://arxiv.org/ abs/1411.0206
Eisert J., Wilkens M., Lewenstein M. Quan-tum games and quantum strategies, http://journals.aps. org/prl/abstract/10.1103/PhysRevLett.83.3077
Старобогатов Р. Квантовые стратегии пре-дотвращения финансово-экономических кризисов http://econf.rae.ru/pdf/2012/05/1282.pdf
Жмурко Т.О. Протоколи квантової теорії ігор / Т.О. Жмурко // Політ. Сучасні проблеми науки: міжнар. наук.-практ. конф. молодих учених і студентів, м. Київ, 2-3 квітня 2014 р., НАУ. – С. 6.
Nayak A., Sikora J., Tunзel L. Quantum and classical coin-flipping protocols based on bit-commit-ment and their point games http://arxiv.org/abs/1504.04217
Flitney A.P., Abbott D. An introduction to quan-tum game theory http://arxiv.org/pdf/quant-ph/0208069.pdf
Gnatyuk S., Zhmurko T., Falat P. Efficiency increasing method for quantum secure direct communi-cation protocols // Proc. of the EEE 8th Intern. Conf. on «Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications» (IDAACS’2015), Warsaw, Poland, September 24-26, 2015: Vol. 1. – p. 468-472.
Leaw J.N., Cheong S.A. Strategic Insights From Playing the Quantum Tic-Tac-Toe http://arxiv. org/abs/1007.3601v1
Корченко О.Г., Васіліу Є.В., Гнатюк С.О. Сучасні квантові технології захисту інформації // Захист інформації. – 2010, № 1. – С. 77-89.
Korchenko O.G., Vasiliu Ye.V., Gnatyuk S.O. Modern directions of quantum cryptography // Proc. of the fourth world congress «Aviation in the XXI-st century» – «Safety in Aviation and Space Technologies». – Kyiv, 2010. – V. 1. – P. 17.1-17.4.
Korchenko O., Vasiliu Ye., Gnatyuk S. et al. Quantum Secure Telecommunication Systems, Telecom-munications Networks – Current Status and Future Trends (ed. by J.H. Ortiz), InTech, 2012, p. 211-236.