-
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication
Authors:
Go Kato,
Masaki Owari,
Masahito Hayashi
Abstract:
It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. I…
▽ More
It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack when the attack satisfies a certain natural condition. In our security proof, the eavesdropper is allowed to modify wiretapped information dependently on the previously wiretapped messages. Our protocol guarantees the secrecy by utilizing one-way classical information transmission (public communication) in the same direction as the quantum network although the verification of quantum information transmission requires two-way classical communication. Our secure network code can be applied to several networks including the butterfly network.
△ Less
Submitted 30 March, 2020;
originally announced March 2020.
-
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks
Authors:
Masahito Hayashi,
Masaki Owari,
Go Kato,
Ning Cai
Abstract:
We discuss the effect of sequential error injection on information leakage under a network code. We formulate a network code for the single transmission setting and the multiple transmission setting. Under this formulation, we show that the eavesdropper cannot improve the power of eavesdropping by sequential error injection when the operations in the network are linear operations. We demonstrate t…
▽ More
We discuss the effect of sequential error injection on information leakage under a network code. We formulate a network code for the single transmission setting and the multiple transmission setting. Under this formulation, we show that the eavesdropper cannot improve the power of eavesdropping by sequential error injection when the operations in the network are linear operations. We demonstrate the usefulness of this reduction theorem by applying a concrete example of network.
△ Less
Submitted 25 March, 2020;
originally announced March 2020.
-
Secrecy and Robustness for Active Attack in Secure Network Coding and its Application to Network Quantum Key Distribution
Authors:
Masahito Hayashi,
Masaki Owari,
Go Kato,
Ning Cai
Abstract:
In network coding, we discuss the effect of sequential error injection on information leakage. We show that there is no improvement when the operations in the network are linear operations. However, when the operations in the network contains non-linear operations, we find a counterexample to improve Eve's obtained information. Furthermore, we discuss the asymptotic rate in a linear network under…
▽ More
In network coding, we discuss the effect of sequential error injection on information leakage. We show that there is no improvement when the operations in the network are linear operations. However, when the operations in the network contains non-linear operations, we find a counterexample to improve Eve's obtained information. Furthermore, we discuss the asymptotic rate in a linear network under the secrecy and robustness conditions as well as under the secrecy condition alone. Finally, we apply our results to network quantum key distribution, which clarifies the type of network that enables us to realize secure long distance communication via short distance quantum key distribution.
△ Less
Submitted 25 September, 2018; v1 submitted 2 March, 2017;
originally announced March 2017.