TY - GEN
T1 - Quantum wireless secure communication protocol
AU - Lin, Tien Sheng
AU - Kuo, Sy Yen
PY - 2007
Y1 - 2007
N2 - In the wireless communication network, transmitting messages from sender to receiver may traverse several intermediate nodes. Any eavesdropper can attack in the communication channel, and any malicious intermediate node can act as receiver to intercept the message. The secure routing path must solve channel attacks and attacks in the malicious node. In the classical field, the solution of the channel attacks is conditional security and we can not provide secure communication in the routing path from sender to receiver. In the quantum field, the security of the authentication protocol is based on the laws of nature, including no-cloning theorem and quantum teleportation. According to the property of no-cloning theorem and quantum teleportation, we can use the shared quantum entangled particles between communicators for liar detection problem. In the quantum cryptography, the security of the authentication protocol is unconditional security. This paper designs the two-way secure communication protocol, which can set up the secure routing path from sender to receiver. The two-way secure communication protocol includes the sender oriented checking and the receiver oriented checking. By using quantum sharing table, these checking schemes investigate whether the routing path is secure or not. In the beginning, the sender and receiver pre-share a quantum sharing table to detect all the dishonest nodes. The quantum sharing table acts as a quantum key distribution which can not be stolen by any Eve. Furthermore, the protocol can teleport a quantum state from sender to receiver to identify whether the communication channel and the intermediate nodes are honest or not. Then, the protocol can achieve the secure routing path to verify the real sender and receiver and confirn that all intermediate nodes are honest. Based on this mechanism, we can achieve high liar detection probability.
AB - In the wireless communication network, transmitting messages from sender to receiver may traverse several intermediate nodes. Any eavesdropper can attack in the communication channel, and any malicious intermediate node can act as receiver to intercept the message. The secure routing path must solve channel attacks and attacks in the malicious node. In the classical field, the solution of the channel attacks is conditional security and we can not provide secure communication in the routing path from sender to receiver. In the quantum field, the security of the authentication protocol is based on the laws of nature, including no-cloning theorem and quantum teleportation. According to the property of no-cloning theorem and quantum teleportation, we can use the shared quantum entangled particles between communicators for liar detection problem. In the quantum cryptography, the security of the authentication protocol is unconditional security. This paper designs the two-way secure communication protocol, which can set up the secure routing path from sender to receiver. The two-way secure communication protocol includes the sender oriented checking and the receiver oriented checking. By using quantum sharing table, these checking schemes investigate whether the routing path is secure or not. In the beginning, the sender and receiver pre-share a quantum sharing table to detect all the dishonest nodes. The quantum sharing table acts as a quantum key distribution which can not be stolen by any Eve. Furthermore, the protocol can teleport a quantum state from sender to receiver to identify whether the communication channel and the intermediate nodes are honest or not. Then, the protocol can achieve the secure routing path to verify the real sender and receiver and confirn that all intermediate nodes are honest. Based on this mechanism, we can achieve high liar detection probability.
KW - No-cloning theorem
KW - Quantum entangled particles
KW - Quantum teleportation
KW - Two-way secure communication protocol
UR - http://www.scopus.com/inward/record.url?scp=47849107948&partnerID=8YFLogxK
U2 - 10.1109/CCST.2007.4373482
DO - 10.1109/CCST.2007.4373482
M3 - 会议稿件
AN - SCOPUS:47849107948
SN - 1424411297
SN - 9781424411290
T3 - Proceedings - International Carnahan Conference on Security Technology
SP - 146
EP - 155
BT - Proceedings 2007 41st Annual IEEE International Carnahan Conference on Security Technology, ICCST
T2 - 2007 41st Annual IEEE Carnahan Conference on Security Technology, ICCST
Y2 - 8 October 2008 through 11 October 2008
ER -