Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-09-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/12/9/1481 |
_version_ | 1797554217028681728 |
---|---|
author | Nur Ziadah Harun Zuriati Ahmad Zukarnain Zurina Mohd Hanapi Idawaty Ahmad |
author_facet | Nur Ziadah Harun Zuriati Ahmad Zukarnain Zurina Mohd Hanapi Idawaty Ahmad |
author_sort | Nur Ziadah Harun |
collection | DOAJ |
description | The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between Alice and Bob. In the proposed protocol, a secure quantum handshake is utilized to share the secret polarization angle and an authentication key at the initial stage of authentication over the quantum channel. The symmetry key is used in this work to protect user data communication within the QSDC protocol, where the same secret key is used to encrypt and decrypt the message. This work adopts the information travel time (ITT) by allowing the sender to detect any interference from third parties. In addition, the operation of the Pauli-X quantum gate increases Eve’s difficulty in stealing the information. The information transmitted is then continued by sending photons once in the quantum channel, which improves the efficiency without losing the message’s security. In addition, to securely transfer the stream of messages, the proposed protocol is operated in single-stage, and the authentication is applied bit-by-bit, thus reducing the transmission time. Security checks are carried out along the data transmission process. Compared to previous protocols, this new initial authentication protocol has remarkable advantages since it does not require public communication to pre-share the authentication key and secret angles before the onset of the transmission, therefore, reducing the communication cost. Moreover, the secret authentication key and polarization angles are updated after a number of bits are sent to increase the security level. The verification process is also conducted to ensure the symmetry of the sender and receiver. The analyses presented herein demonstrate that the proposed authentication protocol is simple and secure in order to ensure the legitimacy of the users. |
first_indexed | 2024-03-10T16:27:34Z |
format | Article |
id | doaj.art-8f0ea85994f94d35abb78aa571cbc2ce |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-10T16:27:34Z |
publishDate | 2020-09-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-8f0ea85994f94d35abb78aa571cbc2ce2023-11-20T13:05:27ZengMDPI AGSymmetry2073-89942020-09-01129148110.3390/sym12091481Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication KeyNur Ziadah Harun0Zuriati Ahmad Zukarnain1Zurina Mohd Hanapi2Idawaty Ahmad3Faculty of Computer Science and Information Technology, University Putra Malaysia, Serdang 43400, Selangor, MalaysiaFaculty of Computer Science and Information Technology, University Putra Malaysia, Serdang 43400, Selangor, MalaysiaFaculty of Computer Science and Information Technology, University Putra Malaysia, Serdang 43400, Selangor, MalaysiaFaculty of Computer Science and Information Technology, University Putra Malaysia, Serdang 43400, Selangor, MalaysiaThe security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between Alice and Bob. In the proposed protocol, a secure quantum handshake is utilized to share the secret polarization angle and an authentication key at the initial stage of authentication over the quantum channel. The symmetry key is used in this work to protect user data communication within the QSDC protocol, where the same secret key is used to encrypt and decrypt the message. This work adopts the information travel time (ITT) by allowing the sender to detect any interference from third parties. In addition, the operation of the Pauli-X quantum gate increases Eve’s difficulty in stealing the information. The information transmitted is then continued by sending photons once in the quantum channel, which improves the efficiency without losing the message’s security. In addition, to securely transfer the stream of messages, the proposed protocol is operated in single-stage, and the authentication is applied bit-by-bit, thus reducing the transmission time. Security checks are carried out along the data transmission process. Compared to previous protocols, this new initial authentication protocol has remarkable advantages since it does not require public communication to pre-share the authentication key and secret angles before the onset of the transmission, therefore, reducing the communication cost. Moreover, the secret authentication key and polarization angles are updated after a number of bits are sent to increase the security level. The verification process is also conducted to ensure the symmetry of the sender and receiver. The analyses presented herein demonstrate that the proposed authentication protocol is simple and secure in order to ensure the legitimacy of the users.https://www.mdpi.com/2073-8994/12/9/1481authentication keyhalf-wave platesuperposition stateunitary transformation |
spellingShingle | Nur Ziadah Harun Zuriati Ahmad Zukarnain Zurina Mohd Hanapi Idawaty Ahmad Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key Symmetry authentication key half-wave plate superposition state unitary transformation |
title | Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key |
title_full | Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key |
title_fullStr | Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key |
title_full_unstemmed | Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key |
title_short | Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key |
title_sort | multi stage quantum secure direct communication using secure shared authentication key |
topic | authentication key half-wave plate superposition state unitary transformation |
url | https://www.mdpi.com/2073-8994/12/9/1481 |
work_keys_str_mv | AT nurziadahharun multistagequantumsecuredirectcommunicationusingsecuresharedauthenticationkey AT zuriatiahmadzukarnain multistagequantumsecuredirectcommunicationusingsecuresharedauthenticationkey AT zurinamohdhanapi multistagequantumsecuredirectcommunicationusingsecuresharedauthenticationkey AT idawatyahmad multistagequantumsecuredirectcommunicationusingsecuresharedauthenticationkey |