Anonymous conference key agreement in linear quantum networks

@article{Jong2022AnonymousCK,
  title={Anonymous conference key agreement in linear quantum networks},
  author={Jarn de Jong and Frederik Hahn and Jens Eisert and Nathan Walk and Anna Pappa},
  journal={ArXiv},
  year={2022},
  volume={abs/2205.09169}
}
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) – an extension of key distribution to multiple parties – has received much attention recently. Interestingly, CKA can also be performed in a way that protects the identities of the participating parties, therefore providing anonymity . In this work, we propose an anonymous CKA protocol for three parties that is implemented in a… 
1 Citations

Figures and Tables from this paper

Experimental network advantage for quantum conference key agreement
TLDR
A six-photon graph-state network is created from which either a four-user GHZ state for direct quantum conference key agreement or the required amount of Bell pairs for the equivalent pair-wise protocol is derived.

References

SHOWING 1-10 OF 32 REFERENCES
Anonymous and secret communication in quantum networks
TLDR
It is demonstrated that quantum physics allows parties—besides communicating securely over a network—to also keep their identities secret, and an anonymous quantum conference key agreement is implemented by sharing multipartite entangled states in a quantum network.
Anonymous Quantum Conference Key Agreement
TLDR
A definition of anonymity for general protocols is provided and a CKA protocol that is provably anonymous under realistic adversarial scenarios is presented that is based on shared Greenberger-Horne-Zeilinger states.
Experimental quantum conference key agreement
TLDR
This work demonstrates quantum conference key agreement, a cryptography protocol leveraging multipartite entanglement to efficiently create identical keys between N users with up to N-1 rate advantage in constrained networks, and highlights a previously unexplored protocol tailored for multinode networks leveraging low-noise, long-distance transmission of GHZ states.
Robust Anonymous Conference Key Agreement enhanced by Multipartite Entanglement
TLDR
This work designs efficient and noisetolerant protocols for anonymous conference key agreement using multipartite Greenberger–Horne–Zeilinger (GHZ) states and introduces security definitions encompassing various levels of anonymity and proves the security of these protocols.
Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
TLDR
Five information-theoretically secure anonymity protocols are experimentally demonstrated on an eight user city-wide quantum network using polarisation entangled photon pairs to enhance the functionality of any fully-connected Quantum Key Distribution network without trusted nodes.
Quantum network routing and local complementation
TLDR
This paper proposes a more general method for establishing EPR pairs in arbitrary networks that uses a graph state instead of maximally entangled pairs to achieve long-distance simultaneous communication, and demonstrates how graph-theoretic tools, and specifically local complementation, help decrease the number of required measurements compared to usual methods applied in repeater schemes.
Multi-partite entanglement can speed up quantum key distribution in networks
TLDR
This work analyzes the security of a protocol for establishing a common secret key between N parties (i.e. a conference key), using resource states with genuine N-partite entanglement, regarding the required resources, achievable secret key rates and threshold qubit error rates.
Sharing Classical Secrets with Continuous-Variable Entanglement: Composable Security and Network Coding Advantage
TLDR
This work establishes security in a composable framework and identifies a network topology, specifically a bottleneck network of lossy channels, and parameter regimes within the reach of present day experiments for which a multi-partite scheme outperforms the corresponding QKD based method in the asymptotic and finite-size setting.
Quantum Conference Key Agreement: A Review
TLDR
The existing quantum CKA protocols based on multipartite entanglement are reviewed, both in the device‐dependent and the device-independent scenario.
Conference key agreement with single-photon interference
TLDR
This work generalizes the main idea of the TF-QKD protocol, by devising a conference key agreement (CKA) where the users simultaneously distill a secret conference key through single-photon interference, and employs for the first time a W-class state as its entanglement resource.
...
...