Quantum Keyless Private Communication With Decoy States for Space Channels (2024)

research-article

Authors: Ángeles Vázquez-Castro, Andreas Winter, Hugo Zbinden

IEEE Transactions on Information Forensics and Security, Volume 19

Pages 6213 - 6224

Published: 05 June 2024 Publication History

Metrics

Total Citations0Total Downloads0

Last 12 Months0

Last 6 weeks0

New Citation Alert added!

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

Manage my Alerts

New Citation Alert!

Please log in to your account

    • View Options
    • References
    • Media
    • Tables
    • Share

Abstract

With the increasing demand for secure communication in optical space networks, it is essential to develop physical-layer scalable security solutions. In this context, we present the asymptotic security analysis of a keyless quantum private communication protocol that transmits classical information over quantum states. Different from the previous literature, our protocol sends dummy (decoy) states optimally obtained from the true information to deceive the eavesdropper. We analyze optical on-off keying (OOK) and binary phase shift keying (BPSK) for several detection scenarios. Our protocol significantly improves the protocol without decoy states whenever Bob is at a technological disadvantage with respect to Eve. Our protocol guarantees positive secrecy capacity when the eavesdropper gathers up to 90-99.9% (depending on the detection scenario) of the photon energy that Bob detects, even when Eve is only limited by the laws of quantum mechanics. We apply our results to the design of an optical inter-satellite link (ISL) study case with pointing losses, and introduce a new design methodology whereby the link margin is guaranteed to be secure by our protocol. Hence, our design does not require knowing the eavesdropper’s location and/or channel state: the protocol aborts whenever the channel drops below the secured margin. Our protocol can be implemented with state-of-the-art space-proof technology. Finally, we also show the potential secrecy advantage when using (not yet available) squeezed quantum states technology.

References

[1]

A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.

[2]

I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339–348, May 1978.

[3]

U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, May 1993.

Digital Library

[4]

C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proc. IEEE ICCSS, Bangalore, India, 1984, pp. 175–179.

[5]

M. Hayashi, “General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562–1575, Apr. 2006.

Digital Library

[6]

M. Hayashi, “Exponential decreasing rate of leaked information in universal random privacy amplification,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3989–4001, Jun. 2011.

Digital Library

[7]

M. Bellare, S. Tessaro, and A. Vardy, “Semantic security for the wiretap channel,” in Proc. Adv. Cryptography, 2012, pp. 294–311.

[8]

M. Bloch and J. Barros, Physical Layer Security: From Information Theory to Security Engineering. Cambridge, U.K.: Cambridge Univ. Press, 2011.

[9]

M. Shakiba-Herfeh, A. Chorti, and H. V. Poor, “Physical layer security: Authentication, integrity, and confidentiality,” in Physical Layer Security, K. N. Le, Ed. Switzerland: Springer Nature, 2021.

[10]

M. Bloch et al., “An overview of information-theoretic security and privacy: Metrics, limits and applications,” IEEE J. Sel. Areas Inf. Theory, vol. 2, no. 1, pp. 5–22, Mar. 2021.

[11]

A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, “On the Gaussian MIMO wiretap channel,” in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 2471–2475.

[12]

S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.

Digital Library

[13]

X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, Oct. 2010.

[14]

J. Xiong, K.-K. Wong, D. Ma, and J. Wei, “A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming,” IEEE Commun. Lett., vol. 16, no. 9, pp. 1496–1499, Sep. 2012.

[15]

N. Romero-Zurita, M. Ghogho, and D. McLernon, “Outage probability based power distribution between data and artificial noise for physical layer security,” IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71–74, Feb. 2012.

[16]

A. Sikri, A. Mathur, M. Bhatnagar, G. Kaddoum, P. Saxena, and J. Nebhen, “Artificial noise injection–based secrecy improvement for FSO systems,” IEEE Photon. J., vol. 13, no. 2, pp. 1–12, Apr. 2021.

[17]

Á. Vázquez-Castro and M. Hayashi, “Physical layer security for RF satellite channels in the finite-length regime,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 4, pp. 981–993, Apr. 2019.

[18]

M. Hayashi and Á. Vázquez-Castro, “Two-way physical layer security protocol for Gaussian channels,” IEEE Trans. Commun., vol. 68, no. 5, pp. 3068–3078, May 2020.

[19]

M. Hayashi and Á. Vázquez-Castro, “Physical layer security protocol for Poisson channels for passive man-in-the-middle attack,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 2295–2305, 2020.

Digital Library

[20]

M. Agaskar and V. W. S. Chan, “Nulling strategies for preventing interference and interception of free space optical communication,” in Proc. IEEE ICC, Jun. 2013, pp. 2520–2525.

[21]

C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J., vol. 27, no. 3, pp. 379–423, Jul. 1948.

[22]

C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.

[23]

Y. Liang, H. V. Poor, and S. Shamai (sh*tz), “Secure communication over fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470–2492, Jun. 2008.

Digital Library

[24]

Y. Liang and H. V. Poor, Information-Theoretic Security (Foundations and Trends in Communications and Information Theory), vol. 5, nos. 1–5. Delft, The Netherlands: Now Publishers, 2009.

Digital Library

[25]

Y. Wu et al., “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, Apr. 2018.

Digital Library

[26]

A. Chorti et al., “Context-aware security for 6G wireless: The role of physical layer security,” IEEE Commun. Standards Mag., vol. 6, no. 1, pp. 102–108, Mar. 2022.

[27]

F. J. Lopez-Martinez, G. Gomez, and J. M. Garrido-Balsells, “Physical-layer security in free-space optical communications,” IEEE Photon. J., vol. 7, no. 2, pp. 1–14, Apr. 2015.

[28]

M. E. P. Monteiro, J. L. Rebelatto, R. D. Souza, and G. Brante, “Maximum secrecy throughput of MIMOME FSO communications with outage constraints,” IEEE Trans. Wireless Commun., vol. 17, no. 5, pp. 3487–3497, May 2018.

[29]

H. Endo, T. S. Han, T. Aoki, and M. Sasaki, “Numerical study on secrecy capacity and code length dependence of the performances in optical wiretap channels,” IEEE Photon. J., vol. 7, no. 5, pp. 1–18, Oct. 2015.

[30]

H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett., vol. 94, Jun. 2005, Art. no.

[31]

A. Vázquez-Castro, D. Rusca, and H. Zbinden, “Quantum keyless private communication versus quantum key distribution for space links,” Phys. Rev. Appl., vol. 16, no. 1, Jul. 2021, Art. no.

[32]

Z. Pan and I. B. Djordjevic, “Secret key distillation over satellite-to-satellite free-space optics channel with a limited-sized aperture eavesdropper in the same plane of the legitimate receiver,” Opt. Exp., vol. 28, no. 25, p. 37129, 2020.

[33]

I. Devetak and A. Winter, “Distillation of secret key and entanglement from quantum states,” Proc. Roy. Soc. A, Math., Phys. Eng. Sci., vol. 461, no. 2053, pp. 207–235, Jan. 2005.

[34]

M. Fujiwara et al., “Free-space optical wiretap channel and experimental secret key agreement in 78 km terrestrial link,” Opt. Exp., vol. 26, no. 15, p. 19513, 2018.

[35]

A. S. Holevo, “Bounds for the quantity of information transmitted by a quantum communication channel,” Problemy Peredachi Informatsii, vol. 9, no. 3, pp. 3–11, 1973.

[36]

R. S. Kennedy, “A near-optimum receiver for the binary coherent state channel,” MIT RLE. Quarterly Progress Report, Tech. Rep. 108. Cambridge, U.K.: Massachusetts, 1973.

[37]

S. J. K. Dolinar, “An optimum receiver for the binary coherent state quantum channel,” MIT RLE Quart. Prog. Rep., Tech. Rep. 111. Cambridge, U.K.: Massachusetts, 1973.

[38]

R. L. Cook, P. J. Martin, and J. M. Geremia, “Optical coherent state discrimination using a closed-loop quantum measurement,” Nature, vol. 446, no. 7137, pp. 774–777, Apr. 2007.

[39]

M. Takeoka, M. Sasaki, P. van Loock, and N. Lütkenhaus, “Implementation of projective measurements with linear optics and continuous photon counting,” Phys. Rev. A, Gen. Phys., vol. 71, no. 2, Feb. 2005, Art. no.

[40]

M. Takeoka and M. Sasaki, “Discrimination of the binary coherent signal: Gaussian-operation limit and simple non-Gaussian near-optimal receivers,” Phys. Rev. A, Gen. Phys., vol. 78, no. 2, Aug. 2008, Art. no.

[41]

C. Wittmann, M. Takeoka, K. N. Cassemiro, M. Sasaki, G. Leuchs, and U. L. Andersen, “Demonstration of near-optimal discrimination of optical coherent states,” Phys. Rev. Lett., vol. 101, no. 21, Nov. 2008, Art. no.

[42]

K. Tsujino et al., “Sub-shot-noise-limit discrimination of on-off keyed coherent signals via a quantum receiver with a superconducting transition edge sensor,” Opt. Exp., vol. 18, no. 8, p. 8107, 2010.

[43]

K. Tsujino et al., “Quantum receiver beyond the standard quantum limit of coherent optical communication,” Phys. Rev. Lett., vol. 106, no. 25, Jun. 2011, Art. no.

[44]

Z. Pan et al., “Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping,” Phys. Rev. Appl., vol. 14, Aug. 2020, Art. no.

[45]

Z. Pan et al., “Secret key distillation across a quantum wiretap channel under restricted eavesdropping,” in Proc. IEEE Int. Symp. Inf. Theory, 2019, pp. 3032–3036.

[46]

T. Vergoossen, R. Bedington, J. A. Grieve, and A. Ling, “Satellite quantum communications when man-in-the-middle attacks are excluded,” Entropy, vol. 21, no. 4, p. 387, Apr. 2019.

[47]

D. Pan, X.-T. Song, and G.-L. Long, “Free-space quantum secure direct communication: Basics, progress, and outlook,” Adv. Devices Instrum., vol. 4, Jan. 2023.

[48]

M. Hayashi, “Tight exponential analysis of universally composable privacy amplification and its applications,” IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7728–7746, Nov. 2013.

Digital Library

[49]

S. Watanabe, “Private and quantum capacities of more capable and less noisy quantum channels,” Phys. Rev. A, Gen. Phys., vol. 85, no. 1, Jan. 2012, Art. no.

[50]

H. Yuen and J. Shapiro, “Optical communication with two-photon coherent states-part I: Quantum-state propagation and quantum-noise,” IEEE Trans. Inf. Theory, vol. IT-24, no. 6, pp. 657–668, Nov. 1978.

[51]

J. Shapiro, H. Yuen, and A. Mata, “Optical communication with two-photon coherent states-part II: Photoemissive detection and structured receiver performance,” IEEE Trans. Inf. Theory, vol. IT-25, no. 2, pp. 179–192, Mar. 1979.

[52]

H. Yuen and J. Shapiro, “Optical communication with two-photon coherent states-part III: Quantum measurements realizable with photoemissive detectors,” IEEE Trans. Inf. Theory, vol. IT-26, no. 1, pp. 78–92, Jan. 1980.

[53]

M. G. A. Paris, “Nearly ideal binary communication in squeezed channels,” Phys. Rev. A, Gen. Phys., vol. 64, no. 1, pp. 014304-1–014304-4, Jun. 2001.

[54]

A. S. Holevo, M. Sohma, and O. Hirota, “Capacity of quantum Gaussian channels,” Phys. Rev. A, Gen. Phys., vol. 59, no. 3, p. 1820, 1999.

[55]

L.-A. Wu, H. J. Kimble, J. L. Hall, and H. Wu, “Generation of squeezed states by parametric down conversion,” Phys. Rev. Lett., vol. 57, no. 20, pp. 2520–2523, Nov. 1986.

[56]

V. V. Dodonov et al., “Dynamical squeezing of photon-added coherent states,” Phys. Rev. A, Gen. Phys., vol. 58, no. 5, pp. 4087–4094, Nov. 1998.

[57]

E. M. F. Curado, S. Faci, J.-P. Gazeau, and D. Noguera, “Lowering the Helstrom Bound with non-standard coherent states,” J. Opt. Soc. Amer. B, Opt. Phys., vol. 38, no. 12, pp. 3556–3566, 2021.

[58]

S. Leung-Yan-Cheong, “On a special class of wiretap channels (corresp.),” IEEE Trans. Inf. Theory, vol. IT-23, no. 5, pp. 625–627, Sep. 1977.

[59]

J. J. Gong and P. K. Aravind, “Expansion coefficients of a squeezed coherent state in the number state basis,” Amer. J. Phys., vol. 58, no. 10, pp. 1003–1006, Oct. 1990.

[60]

G. Chesi, S. Olivares, and M. G. A. Paris, “Squeezing-enhanced phase-shift-keyed binary communication in noisy channels,” Phys. Rev. A, Gen. Phys., vol. 97, no. 3, Mar. 2018, Art. no.

[61]

G. Cariolaro, Quantum Communications (Signals and Communication Technology). Cham, Switzerland: Springer, 2015.

[62]

A. Vázquez-Castro and B. Samandarov, “Quantum advantage of binary discrete modulations for space channels,” IEEE Wireless Commun. Lett., vol. 12, no. 5, pp. 903–906, May 2023.

[63]

C.-C. Chen and C. S. Gardner, “Impact of random pointing and tracking errors on the design of coherent and incoherent optical intersatellite communication links,” IEEE Trans. Commun., vol. 37, no. 3, pp. 252–260, Mar. 1989.

[64]

L. Valentini, A. Faedi, E. Paolini, and M. Chiani, “Analysis of pointing loss effects in deep space optical links,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2021, pp. 1–6.

Recommendations

  • Quantum correlations in Gaussian states via Gaussian channels: steering, entanglement, and discord

    Here we study the quantum steering, quantum entanglement, and quantum discord for Gaussian Einstein---Podolsky---Rosen states via Gaussian channels. And the sudden death phenomena for Gaussian steering and Gaussian entanglement are theoretically ...

    Read More

  • Multipartite entangled magnon states as quantum communication channels

    We investigate the entanglement properties of the two magnon states and explicate conditions under which, the two magnon state becomes useful for several quantum communication protocols. We systematically study the temporal behaviour of concurrence to ...

    Read More

  • Semi-quantum protocol for deterministic secure quantum communication using Bell states

    Based on Bell states, this paper proposes a semi-quantum protocol enabling the limited semi-quantum or "classical" user Bob to transmit the secret message to a fully quantum Alice directly. A classical user is restricted to measure, prepare, reorder and ...

    Read More

Comments

Information & Contributors

Information

Published In

Quantum Keyless Private Communication With Decoy States for Space Channels (1)

IEEE Transactions on Information Forensics and Security Volume 19, Issue

2024

7245 pages

ISSN:1556-6013

Issue’s Table of Contents

1556-6021 © 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.

Publisher

IEEE Press

Publication History

Published: 05 June 2024

Qualifiers

  • Research-article

Contributors

Quantum Keyless Private Communication With Decoy States for Space Channels (2)

Other Metrics

View Article Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Total Citations

  • Total Downloads

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0

Reflects downloads up to 18 Aug 2024

Other Metrics

View Author Metrics

Citations

View Options

View options

Get Access

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

Get this Publication

Media

Figures

Other

Tables

Quantum Keyless Private Communication With Decoy States for Space Channels (2024)
Top Articles
St Edwards Bloomington Mn
Сталь aisi 310s российский аналог
Dlnet Retiree Login
How Far Is Chattanooga From Here
Joe Gorga Zodiac Sign
Erin Kate Dolan Twitter
Our Facility
Günstige Angebote online shoppen - QVC.de
Https //Advanceautoparts.4Myrebate.com
Nj Scratch Off Remaining Prizes
Babyrainbow Private
What is Cyber Big Game Hunting? - CrowdStrike
7543460065
fort smith farm & garden - craigslist
Houses and Apartments For Rent in Maastricht
Nhl Tankathon Mock Draft
Allentown Craigslist Heavy Equipment
1989 Chevy Caprice For Sale Craigslist
The best firm mattress 2024, approved by sleep experts
Viha Email Login
Babbychula
Pearson Correlation Coefficient
Target Minute Clinic Hours
Sessional Dates U Of T
Craigslist Rentals Coquille Oregon
San Jac Email Log In
Pay Stub Portal
Tokioof
Promatch Parts
Ancestors The Humankind Odyssey Wikia
Jeep Cherokee For Sale By Owner Craigslist
Landing Page Winn Dixie
6465319333
Does Circle K Sell Elf Bars
Skroch Funeral Home
Powerball lottery winning numbers for Saturday, September 7. $112 million jackpot
The Pretty Kitty Tanglewood
Indiana Immediate Care.webpay.md
Nearest Ups Office To Me
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Catchvideo Chrome Extension
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
Suntory Yamazaki 18 Jahre | Whisky.de » Zum Online-Shop
Unblocked Games 6X Snow Rider
The 5 Types of Intimacy Every Healthy Relationship Needs | All Points North
Hsi Delphi Forum
Puss In Boots: The Last Wish Showtimes Near Valdosta Cinemas
Image Mate Orange County
How To Find Reliable Health Information Online
Lux Nails & Spa
Dinargurus
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5719

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.