PROBABILISTIC BIDIRECTIONAL QUANTUM SECURE COMMUNICATION BASED ON A SHARED PARTIALLY ENTANGLED STATES

2011 ◽  
Vol 09 (supp01) ◽  
pp. 357-365 ◽  
Author(s):  
FAIEGH SHEIKHEHI ◽  
MOSAYEB NASERI

A new probabilistic bidirectional quantum secure communication protocol based on a shared partially entangled states is proposed. In this scheme the decoy-photon technique is exploited to ensure the security of the transmission of qubits. The highlight of our protocol is that in addition to elimination of the drawback "information leakage", In our protocol it is not necessary to the parties of communication to have an ideal maximally entangled pairs, which makes this scheme more convenient than previews protocols in a practical application.

Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2057
Author(s):  
Yongho Ko ◽  
Jiyoon Kim ◽  
Daniel Gerbi Duguma ◽  
Philip Virgil Astillo ◽  
Ilsun You ◽  
...  

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.


2009 ◽  
Vol 282 (12) ◽  
pp. 2460-2463 ◽  
Author(s):  
Guo-Fang Shi ◽  
Xiao-Qiang Xi ◽  
Xiu-Lao Tian ◽  
Rui-Hong Yue

2015 ◽  
Vol 740 ◽  
pp. 857-860
Author(s):  
Xun Ru Yin

A three-party quantum secure direct communication protocol is proposed, in which the qubit transmission forms a closed loop. In this scheme, each party implements the corresponding unitary operations according to his secret bit value over the quantum channels. Then, by performing Bell measurements on the encoded particles, each party can extract the other two parties’ secret information simultaneously. Thus the three parties realize the direct exchange successfully.


Sign in / Sign up

Export Citation Format

Share Document