Loading…
Quantum Keyless Private Communication With Decoy States for Space Channels
With the increasing demand for secure communication in optical space networks, it is essential to develop physical-layer scalable security solutions. In this context, we present the asymptotic security analysis of a keyless quantum private communication protocol that transmits classical information...
Saved in:
Published in: | IEEE transactions on information forensics and security 2024, Vol.19, p.6213-6224 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | With the increasing demand for secure communication in optical space networks, it is essential to develop physical-layer scalable security solutions. In this context, we present the asymptotic security analysis of a keyless quantum private communication protocol that transmits classical information over quantum states. Different from the previous literature, our protocol sends dummy (decoy) states optimally obtained from the true information to deceive the eavesdropper. We analyze optical on-off keying (OOK) and binary phase shift keying (BPSK) for several detection scenarios. Our protocol significantly improves the protocol without decoy states whenever Bob is at a technological disadvantage with respect to Eve. Our protocol guarantees positive secrecy capacity when the eavesdropper gathers up to 90-99.9% (depending on the detection scenario) of the photon energy that Bob detects, even when Eve is only limited by the laws of quantum mechanics. We apply our results to the design of an optical inter-satellite link (ISL) study case with pointing losses, and introduce a new design methodology whereby the link margin is guaranteed to be secure by our protocol. Hence, our design does not require knowing the eavesdropper's location and/or channel state: the protocol aborts whenever the channel drops below the secured margin. Our protocol can be implemented with state-of-the-art space-proof technology. Finally, we also show the potential secrecy advantage when using (not yet available) squeezed quantum states technology. |
---|---|
ISSN: | 1556-6013 1556-6021 |
DOI: | 10.1109/TIFS.2024.3410132 |