Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded

An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides...

Full description

Bibliographic Details
Main Authors: Tom Vergoossen, Robert Bedington, James A. Grieve, Alexander Ling
Format: Article
Language:English
Published: MDPI AG 2019-04-01
Series:Entropy
Subjects:
PKD
Online Access:https://www.mdpi.com/1099-4300/21/4/387
id doaj-7964de3d3bd24b699982a03f59df8e46
record_format Article
spelling doaj-7964de3d3bd24b699982a03f59df8e462020-11-25T00:50:03ZengMDPI AGEntropy1099-43002019-04-0121438710.3390/e21040387e21040387Satellite Quantum Communications When Man-in-the-Middle Attacks Are ExcludedTom Vergoossen0Robert Bedington1James A. Grieve2Alexander Ling3Centre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeCentre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeCentre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeCentre for Quantum Technologies, National University of Singapore, Singapore 117543, SingaporeAn application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible.https://www.mdpi.com/1099-4300/21/4/387quantum communicationquantum cryptographyquantum key distributionsatellite QKDaccess controlthreat modelphoton key distributionPKD
collection DOAJ
language English
format Article
sources DOAJ
author Tom Vergoossen
Robert Bedington
James A. Grieve
Alexander Ling
spellingShingle Tom Vergoossen
Robert Bedington
James A. Grieve
Alexander Ling
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
Entropy
quantum communication
quantum cryptography
quantum key distribution
satellite QKD
access control
threat model
photon key distribution
PKD
author_facet Tom Vergoossen
Robert Bedington
James A. Grieve
Alexander Ling
author_sort Tom Vergoossen
title Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_short Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_full Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_fullStr Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_full_unstemmed Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_sort satellite quantum communications when man-in-the-middle attacks are excluded
publisher MDPI AG
series Entropy
issn 1099-4300
publishDate 2019-04-01
description An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible.
topic quantum communication
quantum cryptography
quantum key distribution
satellite QKD
access control
threat model
photon key distribution
PKD
url https://www.mdpi.com/1099-4300/21/4/387
work_keys_str_mv AT tomvergoossen satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
AT robertbedington satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
AT jamesagrieve satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
AT alexanderling satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
_version_ 1725249698845949952