Quantum wireless secure communication protocol

Tien Sheng Lin*, Sy Yen Kuo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

In the wireless communication network, transmitting messages from sender to receiver may traverse several intermediate nodes. Any eavesdropper can attack in the communication channel, and any malicious intermediate node can act as receiver to intercept the message. The secure routing path must solve channel attacks and attacks in the malicious node. In the classical field, the solution of the channel attacks is conditional security and we can not provide secure communication in the routing path from sender to receiver. In the quantum field, the security of the authentication protocol is based on the laws of nature, including no-cloning theorem and quantum teleportation. According to the property of no-cloning theorem and quantum teleportation, we can use the shared quantum entangled particles between communicators for liar detection problem. In the quantum cryptography, the security of the authentication protocol is unconditional security. This paper designs the two-way secure communication protocol, which can set up the secure routing path from sender to receiver. The two-way secure communication protocol includes the sender oriented checking and the receiver oriented checking. By using quantum sharing table, these checking schemes investigate whether the routing path is secure or not. In the beginning, the sender and receiver pre-share a quantum sharing table to detect all the dishonest nodes. The quantum sharing table acts as a quantum key distribution which can not be stolen by any Eve. Furthermore, the protocol can teleport a quantum state from sender to receiver to identify whether the communication channel and the intermediate nodes are honest or not. Then, the protocol can achieve the secure routing path to verify the real sender and receiver and confirn that all intermediate nodes are honest. Based on this mechanism, we can achieve high liar detection probability.

Original languageEnglish
Title of host publicationProceedings 2007 41st Annual IEEE International Carnahan Conference on Security Technology, ICCST
Pages146-155
Number of pages10
DOIs
StatePublished - 2007
Externally publishedYes
Event2007 41st Annual IEEE Carnahan Conference on Security Technology, ICCST - Ottawa, ON, Canada
Duration: 08 10 200811 10 2008

Publication series

NameProceedings - International Carnahan Conference on Security Technology
ISSN (Print)1071-6572

Conference

Conference2007 41st Annual IEEE Carnahan Conference on Security Technology, ICCST
Country/TerritoryCanada
CityOttawa, ON
Period08/10/0811/10/08

Keywords

  • No-cloning theorem
  • Quantum entangled particles
  • Quantum teleportation
  • Two-way secure communication protocol

Fingerprint

Dive into the research topics of 'Quantum wireless secure communication protocol'. Together they form a unique fingerprint.

Cite this