Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

[1]  Bart De Decker,et al.  Ubiquitous Privacy-Preserving Identity Managment , 2008, SEC.

[2]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[3]  Jian-Wei Pan,et al.  Experimental demonstration of a hyper-entangled ten-qubit Schr\ , 2008, 0809.4277.

[4]  Gilles Brassard,et al.  Anonymous Quantum Communication , 2007, ASIACRYPT.

[5]  Gail-Joon Ahn,et al.  Portable User-Centric Identity Management , 2008, SEC.

[6]  S. Etcheverry,et al.  Quantum key distribution session with 16-dimensional photonic states , 2013, Scientific Reports.

[7]  P. Oscar Boykin Information Security and Quantum Mechanics: Security of Quantum Protocols , 2002 .

[8]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[9]  Xia Zhou,et al.  TRUST: A General Framework for Truthful Double Spectrum Auctions , 2009, IEEE INFOCOM 2009.

[10]  Zhi Ma,et al.  Decoy-state quantum key distribution with biased basis choice , 2013, Scientific Reports.

[11]  Oded Goldreich Foundations of Cryptography: Index , 2001 .

[12]  Ying Guo,et al.  The Dining Cryptographer Problem-Based Anonymous Quantum Communication via Non-maximally Entanglement State Analysis , 2013 .

[13]  J. Boyan DATA AND INFORMATION COLLECTION ON THE NET The Anonymizer Protecting User Privacy on the Web , 1997 .

[14]  Tian-Yin Wang,et al.  Economical quantum anonymous transmissions , 2010 .

[15]  Jan Bouda,et al.  Anonymous Transmission of Quantum Information , 2007, 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07).

[16]  S. Rajsbaum Foundations of Cryptography , 2014 .

[17]  Willy Susilo,et al.  A provably secure identity-based proxy ring signature based on RSA , 2015, Secur. Commun. Networks.

[18]  Kaoru Shimizu,et al.  Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair , 2009 .

[19]  Lan Zhou,et al.  Deterministic entanglement distillation for secure double-server blind quantum computation , 2013, Scientific Reports.

[20]  Matthias Christandl,et al.  Quantum Anonymous Transmissions , 2004, ASIACRYPT.

[21]  Alain Tapp,et al.  Information-Theoretic Security Without an Honest Majority , 2007, ASIACRYPT.

[22]  Birgit Pfitzmann,et al.  Unconditional Byzantine Agreement for any Number of Faulty Processors , 1992, STACS.

[23]  David Chaum,et al.  Unconditionally Secure Digital Signatures , 1990, CRYPTO.

[24]  Birgit Pfitzmann,et al.  Unconditionally Untraceable and Fault-tolerant Broadcast and SecretBallot Election , 1992 .

[25]  Yossi Matias,et al.  Consistent, yet anonymous, Web access with LPWA , 1999, CACM.

[26]  Oded Goldreich,et al.  Foundations of Cryptography: List of Figures , 2001 .

[27]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[28]  Su-Juan Qin,et al.  Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair' , 2010 .