scholarly journals Secure communications over hybrid military networks

Author(s):  
Vamsi Paruchuri ◽  
Arjan Durresi ◽  
Sriram Chellappan
Author(s):  
Wei Wang ◽  
Xinrui Li ◽  
Rui Wang ◽  
Kanapathippillai Cumanan ◽  
Wei Feng ◽  
...  

2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Darius Bunandar ◽  
Luke C. G. Govia ◽  
Hari Krovi ◽  
Dirk Englund

AbstractQuantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments, however, predict their achievable key rates using asymptotic formulas, which assume the transmission of an infinite number of signals, partly because QKD proofs with finite transmissions (and finite-key lengths) can be difficult. Here we develop a robust numerical approach for calculating the key rates for QKD protocols in the finite-key regime in terms of two semi-definite programs (SDPs). The first uses the relation between conditional smooth min-entropy and quantum relative entropy through the quantum asymptotic equipartition property, and the second uses the relation between the smooth min-entropy and quantum fidelity. The numerical programs are formulated under the assumption of collective attacks from the eavesdropper and can be promoted to withstand coherent attacks using the postselection technique. We then solve these SDPs using convex optimization solvers and obtain numerical calculations of finite-key rates for several protocols difficult to analyze analytically, such as BB84 with unequal detector efficiencies, B92, and twin-field QKD. Our numerical approach democratizes the composable security proofs for QKD protocols where the derived keys can be used as an input to another cryptosystem.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 521
Author(s):  
Min Wook Kang ◽  
Yun Won Chung

In delay-tolerant networking (DTN), messages are delivered to destination nodes by using opportunistic contacts between contact nodes, even if stable routing paths from source nodes to destination nodes do not exist. In some DTN network environments, such as military networks, nodes movement follows a group movement model, and an efficient DTN routing protocol is required to use the characteristics of group mobility. In this paper, we consider a network environment, where both intra- and intergroup routing are carried out by using DTN protocols. Then, we propose an efficient routing protocol with overload control for group mobility, where delivery predictability for group mobility is defined and proactive overload control is applied. Performance evaluation results show that the proposed protocol had better delivery ratios and overhead ratios than compared protocols, although the delivery latency was increased.


Author(s):  
Esteban Tlelo-Cuautle ◽  
Omar Guillén-Fernández ◽  
Jose de Jesus Rangel-Magdaleno ◽  
Ashley Melendez-Cano ◽  
Jose Cruz Nuñez-Perez ◽  
...  

2014 ◽  
Vol 13 (4) ◽  
pp. 1790-1805 ◽  
Author(s):  
Hyoungsuk Jeon ◽  
Steven W. McLaughlin ◽  
Il-Min Kim ◽  
Jeongseok Ha

Sign in / Sign up

Export Citation Format

Share Document