Quantum Cryptography over Multi-Sites Networks

While most of the researches on channel security have focused on point to point communication, little attention was given to multi nodes networks. In this study, the possibilities of loopholes in multi-sites networks using quantum secure direct communication encryption protocols are analyzed. Several solutions are proposed. Depending on the installed topology (linear, ring, star and partially meshed) and on the distance between the nodes, a different solution is proposed

[1]  Xinhua Ling,et al.  The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD) , 2017, ArXiv.

[2]  Hanwu Chen,et al.  Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage , 2018 .

[3]  Zhigang Chen,et al.  Bidirectional Quantum Secure Direct Communication Based on Entanglement , 2008 .

[4]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[5]  Gui-Lu Long,et al.  Experimental quantum secure direct communication with single photons , 2015, Light: Science & Applications.

[6]  Shihan Sajeed,et al.  Invisible Trojan-horse attack , 2017, Scientific Reports.

[7]  Edo Waks,et al.  Secure quantum routing , 2016 .

[8]  Wenping Ma,et al.  Three-party Quantum Secure Direct Communication with Single Photons in both Polarization and Spatial-mode Degrees of Freedom , 2016 .

[9]  Jun-Lin Li,et al.  Two-step quantum secure direct communication scheme with frequency coding , 2017 .

[10]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[11]  Wei Zhang,et al.  Experimental long-distance quantum secure direct communication. , 2017, Science bulletin.

[12]  Kai Wen,et al.  Quantum secure direct communication and deterministic secure quantum communication , 2007 .

[13]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[14]  Michael R. Grimaila,et al.  Using Modeling and Simulation to Study Photon Number Splitting Attacks , 2016, IEEE Access.

[15]  Cao Hai-Jing,et al.  Quantum Secure Direct Communication with W State , 2006 .

[16]  Yi-you Nie,et al.  Quantum Secure Direct Communication Based on Four-Qubit Cluster States , 2013 .

[17]  Xiangfu Zou,et al.  Attacks and Improvements of QSDC Schemes Based on CSS Codes , 2011, ICIC.

[18]  Benjamin Schumacher,et al.  Quantum Processes Systems, and Information , 2010 .

[19]  Bin Gu,et al.  Robust Quantum Secure Communication with Spatial Quantum States of Single Photons , 2013 .

[20]  Wei Zhang,et al.  Quantum Secure Direct Communication with Quantum Memory. , 2016, Physical review letters.

[21]  Masahide Sasaki,et al.  Quantum networks: where should we be heading? , 2017 .

[22]  Piotr Zawadzki Eavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rate , 2016, Quantum Inf. Process..

[23]  Andrei Gaidash,et al.  Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices , 2016 .

[24]  Zhi Ma,et al.  Quantum man-in-the-middle attack on the calibration process of quantum key distribution , 2018, Scientific Reports.