Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-04-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/21/4/387 |
id |
doaj-7964de3d3bd24b699982a03f59df8e46 |
---|---|
record_format |
Article |
spelling |
doaj-7964de3d3bd24b699982a03f59df8e462020-11-25T00:50:03ZengMDPI AGEntropy1099-43002019-04-0121438710.3390/e21040387e21040387Satellite Quantum Communications When Man-in-the-Middle Attacks Are ExcludedTom Vergoossen0Robert Bedington1James A. Grieve2Alexander Ling3Centre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeCentre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeCentre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeCentre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeAn application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible.https://www.mdpi.com/1099-4300/21/4/387quantum communicationquantum cryptographyquantum key distributionsatellite QKDaccess controlthreat modelphoton key distributionPKD |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tom Vergoossen Robert Bedington James A. Grieve Alexander Ling |
spellingShingle |
Tom Vergoossen Robert Bedington James A. Grieve Alexander Ling Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded Entropy quantum communication quantum cryptography quantum key distribution satellite QKD access control threat model photon key distribution PKD |
author_facet |
Tom Vergoossen Robert Bedington James A. Grieve Alexander Ling |
author_sort |
Tom Vergoossen |
title |
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded |
title_short |
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded |
title_full |
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded |
title_fullStr |
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded |
title_full_unstemmed |
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded |
title_sort |
satellite quantum communications when man-in-the-middle attacks are excluded |
publisher |
MDPI AG |
series |
Entropy |
issn |
1099-4300 |
publishDate |
2019-04-01 |
description |
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible. |
topic |
quantum communication quantum cryptography quantum key distribution satellite QKD access control threat model photon key distribution PKD |
url |
https://www.mdpi.com/1099-4300/21/4/387 |
work_keys_str_mv |
AT tomvergoossen satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded AT robertbedington satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded AT jamesagrieve satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded AT alexanderling satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded |
_version_ |
1725249698845949952 |