透過您的圖書館登入
IP:13.59.136.170
  • 學位論文

量子間接通訊之安全傳遞機制

Quantum Indirect Communication with Secure Transmission Mechanisms

指導教授 : 郭斯彥

摘要


近年來基於量子傳輸科技和量子金鑰分配技術不斷地創新與發展,使得先進量子密碼技術可以應用於不同的安全性問題,包括量子認證、量子安全通訊、量子偵測、量子安全傳遞及量子簽章;因為有如此多的應用,使得量子資訊網路可以在未來成為一個實際性的網路。 比較量子密碼學和古典密碼學,主要差異來自物理特性,量子通道是基於物理特性包括不確定原理、不可複製性和量子遠端傳遞,這些物理特性使得量子通道的安全性比古典通道高。因為使用物理特性之量子通道,我們可以查出竊聽行為並且提供安全的直接通信。 然而,古典密碼學不可能查出竊聽行為,特别是在有開放的無線媒介。有關於時間複雜度,量子密碼演算法基於物理原理會比基於數學計算的古典密碼演算法來得好。例如,以因式分解而言,量子密碼演算法的時間複雜度是多項式函數而古典密碼演算法的時間複雜度是指數函數。 和先前的量子研究比較,目前文獻上的應用大多使用量子金鑰分配協定,如BB84和E91,來建立一個保密性的金鑰,進而運用此一金鑰在直接通信的環境中達到確保傳輸機密性的要求。然而,在一般常見的情況下,信息傳遞的連接形式是屬於間接通信方式,在間接通訊環境下,在傳遞過程中,可能遭遇三種型態的攻擊,包括竊聽者、中間攻擊者及惡意節點,這種情形下的傳遞路徑稱為不安全的傳送路徑。在一個不安全的傳送路徑之下,我們不可能尋求一個安全傳送路徑來傳送量子訊息。對量子間接通訊而言,抵抗三種型態的攻擊和獲得安全傳輸的過程是個困難的工作。 對於量子間接通訊而言,我的論文是設計幾個傳遞機制來達到資料保密的目標,其主要分為下列幾個部份。對於量子認證而言,我們提出兩種類型的量子認證機制來解決在不安全的傳送路徑下發令者和接收器之間的識別問題,遠端雙方可以達到安全認證過程並且抵抗竊聽者和惡意節點的攻擊,根據物理特性,這些機制可以達到安全認證過程。對於量子偵測而言,發令者和接收器使用量子糾纏光子和協同合作電路來查出惡意節點之侵入行為,根據協同合作電路,接收器能夠獲得量子的原始狀態,因此可以查出惡意節點之攻擊行為。 對於量子傳輸而言,三個量子傳遞機制被提出,來達到在一個不安全的傳送路徑之傳遞機密性。這些機制可能抵抗攻擊的三種類型,並且讓接收器有判斷能力去決定所接受量子傳送框架是否滿足安全性要求,來決定接受與否,這是一個新的突破。對於量子簽章而言,客戶端和伺服器能使用量子分享密碼技術來獲取間接通訊下的安全簽章。如果量子安全密碼技術的這些應用可以成熟發展,那麼本研究所提出之量子傳遞機制,能夠保證於間接通訊條件下來達到量子訊息安全傳遞。

並列摘要


Recently, on the basis of advanced development in quantum transmission technology and quantum key distribution, the advanced techniques of quantum cryptography can be applied to the different security issues, including quantum authentication, quantum secure communication, quantum detection, quantum secure transmission and quantum signature. These applications let that quantum information networks will become realistic in the future. Compared with quantum cryptography and classical cryptography, the major difference comes from the laws of physics. Quantum channel is based on the laws of physics such as uncertainty principle, no-cloning theorem and quantum teleportation. These physical properties make quantum channel is more secure than classical channel. By using physical properties of quantum channel, we can detect eavesdropping and support secure direct communication. However, classical cryptography can not detect the presence of eavesdroppers, especially with wireless open medium. In regard to the time complexity, quantum cryptography algorithm based on the laws of physics is better than classical cryptography algorithm based on mathematical computation. For example, in the factoring problem, time complexity of quantum algorithm is polynomial time. Compared with classical cryptography algorithm, its time complexity is exponential. Compared with previous quantum researches, these applications used quantum key distribution protocols such as BB84 and E91 to generate a secret key which can be used to achieve transmission integrity in the direct communication. However, in general, the connection type of transmitting message is indirect communication. Under the indirect communication, transmitting message from source to destination may pass through several intermediate nodes and communication channels. In the routing path, there are three types of attacks, including eavesdropping, man-in-the-middle attacks and malicious node. It is called an unsafe routing path. Under an unsafe routing path, we can not pursue the secure routing path to transmit quantum message. It is a difficult work to resist the previous attacks and get the secure transmission process for quantum indirect communication. For quantum indirect communication, this dissertation is to design several transmission mechanisms which are used to achieve the data security. This work includes the following parts. For quantum authentication, we present two types of quantum authentication mechanism that can solve the identification problem between the sender and receiver under the unsafe routing path. Two remote parties can achieve the secure authentication process to resist eavesdropping and malicious node. On the basis of the laws of physics, the secure authentication process can be achieved. For quantum detection, the sender and receiver can use quantum entangled qubits and a collaborative working circuit to detect the intrusive behavior of malicious node. Based on this circuit, the receiver can obtain the original quantum state of sending quantum qubits such that the intrusive behavior of malicious node can be detected. For quantum transmission, three quantum transmission mechanisms are proposed to achieve transmission integrity under an unsafe routing path. These mechanisms can resist three types of attacks and let the receiver has the capability to judge whether the receiving quantum frame is complied with the security requirement and can be accepted or not. This is a new breakthrough. For quantum signature, client and server can use the property of quantum secret sharing to secure the signature process for indirect communication. If the developed techniques of these applications are mature, then the proposed quantum transmission mechanisms can guarantee that the quantum message can be securely transmitted in the quantum indirect communication.

參考文獻


[1] C. Y. Lu, T. Yang, and J. W. Pan, S. Mancini, “Experimental multiparticle entanglement swapping for quantum networking,” Phys. Rev. Lett. 103, 020501 (2009).
[2] S. Broadfoot, U. Domer, and D. Jaksch, ”Singlet generation in mixed-state quantum networks,” Phys. Rev. A 81, 042316 (2009).
[3] M. Aspelmeyer, T. Jennewein, M. Pfennigbauer, W. R. Leeb, A. Zeilinger, ”Long-distance quantum communication with entangled photons using satellites,” IEEE Journal of Quantum Electronics, vol. 9, no. 6, pp. 1541-1551, Nov-Dec 2003.
[4] S. T. Cheng, C. Y. Wang, and M. H. Tao," Quantum communication for Wireless Wide-Area Networks," IEEE JASC, vol. 23, no. 7, pp. 1424-1432, July 2005.
[5] Z. J. Zhang, Z. X. Man, “Multiparty quantum secret sharing of classical messages based on entanglement swapping,” Phys. Rev. A 72, 022303 (2005).

延伸閱讀