Secure quantum network coding based on quantum homomorphic message authentication

As the principal security threat, pollution attacks also seriously affect the security of quantum network coding, just like they do for the classical network coding. Based on this, we first propose two secure quantum homomorphic message authentication schemes based on quantum circuit, which well resist the pollution attacks launched by outside attackers and the attackers including inside untrusted nodes over the general quantum network. Then, we apply this authentication method into our extended quantum network coding scheme over the multi-unicast network $$\mathcal {N}$$N, solving the quantum k-pair problem securely and perfectly. Analysis results show that our proposed quantum network coding scheme has higher security and higher quantum communication rate, compared with the existing secure scheme.

[1]  Dan Boneh,et al.  Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.

[2]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[3]  Ziye Zhang,et al.  Existence, uniqueness, and exponential stability analysis for complex-valued memristor-based BAM neural networks with time delays , 2017, Appl. Math. Comput..

[4]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[5]  Sae-Young Chung,et al.  Parallel Opportunistic Routing in Wireless Networks , 2009, IEEE Transactions on Information Theory.

[6]  Gang Xu,et al.  Quantum state secure transmission in network communications , 2014, Inf. Sci..

[7]  Karol Bartkiewicz,et al.  Using quantum routers to implement quantum message authentication and Bell-state manipulation , 2014 .

[8]  Tongsong Jiang,et al.  An algebraic method for quaternion and complex Least Squares coneigen-problem in quantum mechanics , 2014, Appl. Math. Comput..

[9]  Chau Yuen,et al.  A Tag Encoding Scheme against Pollution Attack to Linear Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Kenneth W. Shum,et al.  Linear Network Coding for Erasure Broadcast Channel With Feedback: Complexity and Algorithms , 2012, IEEE Transactions on Information Theory.

[11]  Frédérique E. Oggier,et al.  An Authentication Code Against Pollution Attacks in Network Coding , 2009, IEEE/ACM Transactions on Networking.

[12]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[13]  Tao Jiang,et al.  A Novel Homomorphic MAC Scheme for Authentication in Network Coding , 2011, IEEE Communications Letters.

[14]  Tao Jiang,et al.  An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding , 2013, IEEE Transactions on Computers.

[15]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[16]  Jing Wang,et al.  synchronization for singularly perturbed complex networks with semi-Markov jump topology , 2018, Appl. Math. Comput..

[17]  Jianwei Liu,et al.  Quantum Network Coding Against Pollution Attacks , 2016, IEEE Communications Letters.

[18]  Rodney Van Meter,et al.  Analysis of quantum network coding for realistic repeater networks , 2015, 1508.02141.

[19]  Feihu Xu,et al.  Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.

[20]  Mark Zhandry,et al.  Quantum-Secure Message Authentication Codes , 2013, IACR Cryptol. ePrint Arch..

[21]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[22]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[23]  Gang Xu,et al.  The solvability of quantum k-pair network in a measurement-based way , 2017, Scientific Reports.

[24]  Hiroshi Imai,et al.  Quantum network coding for quantum repeaters , 2012, 1205.3745.

[25]  Randall Dougherty,et al.  Nonreversibility and Equivalent Constructions of Multiple-Unicast Networks , 2006, IEEE Transactions on Information Theory.

[26]  Fuguo Deng,et al.  Efficient high-capacity quantum secret sharing with two-photon entanglement , 2006, quant-ph/0602160.

[27]  Martin Rötteler,et al.  General Scheme for Perfect Quantum Network Coding with Free Classical Communication , 2009, ICALP.

[28]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[29]  Masahito Hayashi,et al.  Prior entanglement between senders enables perfect quantum network coding with modification , 2007, 0706.0197.

[30]  Masahito Hayashi,et al.  Single-shot secure quantum network coding on butterfly network with free public communication , 2017, Quantum Science and Technology.

[31]  Masahito Hayashi,et al.  Quantum Network Coding , 2006, STACS.

[32]  Debbie W. Leung,et al.  Quantum Network Communication—The Butterfly and Beyond , 2010, IEEE Transactions on Information Theory.

[33]  Alexander Russell,et al.  Quantum-secure message authentication via blind-unforgeability , 2018, IACR Cryptol. ePrint Arch..

[34]  Harumichi Nishimura,et al.  Quantum network coding — How can network coding be applied to quantum information? , 2013, 2013 International Symposium on Network Coding (NetCod).

[35]  Donghua Zhou,et al.  Data-based predictive control for networked nonlinear systems with packet dropout and measurement noise , 2017, Journal of Systems Science and Complexity.

[36]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[37]  Michael Epping,et al.  Robust entanglement distribution via quantum network coding , 2016 .

[38]  Jianguo Huang,et al.  Solving steady incompressible Navier-Stokes equations by the Arrow-Hurwicz method , 2017, J. Comput. Appl. Math..

[39]  Xinxin Niu,et al.  Probabilistic quantum network coding of M-qudit states over the butterfly network , 2010 .

[40]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[41]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[42]  Martin Rötteler,et al.  Constructing quantum network coding schemes from classical nonlinear protocols , 2010, 2011 IEEE International Symposium on Information Theory Proceedings.

[43]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[44]  M. Curty,et al.  Quantum authentication of classical messages , 2001, quant-ph/0103122.

[45]  Huanhe Dong,et al.  Generalized Bilinear Differential Operators, Binary Bell Polynomials, and Exact Periodic Wave Solution of Boiti-Leon-Manna-Pempinelli Equation , 2014 .

[46]  Xiaoqian Zhang,et al.  Controlled quantum secure direct communication by entanglement distillation or generalized measurement , 2016, Quantum Information Processing.

[47]  Masahito Hayashi,et al.  Secure Quantum Network Coding on Butterfly Network , 2017 .

[48]  Mio Murao,et al.  Network Coding for Distributed Quantum Computation Over Cluster and Butterfly Networks , 2015, IEEE Transactions on Information Theory.

[49]  Tzonelih Hwang,et al.  New quantum private comparison protocol using EPR pairs , 2011, Quantum Information Processing.

[50]  Junwei Lu,et al.  Hopf bifurcation analysis of a complex-valued neural network model with discrete and distributed delays , 2018, Appl. Math. Comput..

[51]  Gang Xu,et al.  Network coding for quantum cooperative multicast , 2015, Quantum Inf. Process..