A quantum optical firewall based on simple quantum devices

In order to enhance the transmission security in quantum communications via coherent states, we propose a quantum optical firewall device to protect a quantum cryptosystem against eavesdropping through optical attack strategies. Similar to the classical model of the firewall, the proposed device gives legitimate users the possibility of filtering, controlling (input/output states) and making a decision (access or deny) concerning the traveling states. To prove the security and efficiency of the suggested optical firewall, we analyze its performances against the family of intercept and resend attacks, especially against one of the most prominent attack schemes known as “Faked State Attack.”

[1]  E. Andersson,et al.  Experimentally realizable quantum comparison of coherent states and its applications , 2006, quant-ph/0601130.

[2]  Morad El Baz,et al.  Quantum key distribution via tripartite coherent states , 2011, Quantum Inf. Process..

[3]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[4]  A. Meslouhi,et al.  A Secure Quantum Communication via Deformed Tripartite Coherent States , 2014 .

[5]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[6]  Y. Hassouni,et al.  Communication via an entangled coherent quantum network , 2010, 1011.3915.

[7]  Mohamed G. Gouda,et al.  Diverse Firewall Design , 2008, IEEE Trans. Parallel Distributed Syst..

[8]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[9]  Dag R. Hjelme,et al.  Faked states attack on quantum cryptosystems , 2005 .

[10]  I. D. Ivanović How to differentiate between non-orthogonal states , 1987 .

[11]  John Preskill,et al.  Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..

[12]  D. Dieks Communication by EPR devices , 1982 .

[13]  Christian Kurtsiefer,et al.  Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.

[14]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[15]  H. Weinfurter,et al.  Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .

[16]  Mario Pivk,et al.  Applied Quantum Cryptography , 2010 .

[17]  M. Baz,et al.  Quantum key distribution using optical coherent states via amplitude damping , 2015 .

[18]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[19]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[20]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[21]  P. Dirac Principles of Quantum Mechanics , 1982 .

[22]  Feiyi Wang,et al.  Design and implementation of a scalable intrusion detection system for the protection of network infrastructure , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[23]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[24]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[25]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[26]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.