簡易檢索 / 詳目顯示

研究生: 洪志修
Hung, Chih-Hsiu
論文名稱: 量子匿名通訊網路
Quantum Anonymous Communication Network
指導教授: 黃宗立
Hwang, Tzonelih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 50
中文關鍵詞: 量子密碼分散式量子網路洋蔥路由匿名量子匿名通訊
外文關鍵詞: Quantum Cryptography, Distributed Quantum Network, Onion Routing, Anonymity, Quantum Anonymous Communication
相關次數: 點閱:136下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在現今的研究成果下,量子運算技術已經被證明會威脅當下使用的非對稱金鑰加密系統(如:RSA)。換言之,由於量子電腦強大的平行運算能力,許多基於複雜數學難題的加密系統將會被量子電腦以多項式時間內所破解[1],因此在近幾年量子密碼的研究受到許多的重視與關注,亦有許多應用被提出。
    在量子密碼的研究開始發展後,量子網路的概念亦呼之欲出。網路的基本訴求是為了讓兩個或以上的使用者能夠互相通訊,因為使用者之間的距離過長以至於無法直接做溝通,所以使用者們需藉由中繼點或路由的協助下傳送訊息給對方。然而在量子網路中,如何在使用者之間分享量子糾結態是個重要的議題,由於量子長距離的傳輸會造成能量的消耗,最後造成量子態的改變或是消失。此外量子暴露在網路傳輸下,使得量子有機會被竊聽者攔截而得到資訊,或是有機會對網路做中間人攻擊。
    另外在資訊安全領域中,匿名亦為一重大的討論議題,不同於一般關注在資料安全的研究,匿名著重於如何隱藏訊息的傳送者或接收者的身分,像是可以應用於投票、拍賣或電子郵件等等。在近幾年,洋蔥路由(Tor)成為最知名的匿名網路系統[2],藉由洋蔥路由的幫助,可以供使用者或是服務提供者匿名的功能。除此之外其洋蔥加密的特性,可讓在網路中傳送的訊息無法被追蹤,以避免他人追蹤訊息的路徑來尋找訊息的發送者。
    在本論文中,將提出基於不誠實中繼之分散式量子網路,用以讓長距離的使用者間安全的分享量子糾結態,並免於被竊聽者實施中間人攻擊的可能。此外亦提出兩個量子匿名通訊的環境(量子洋蔥路由與量子隱匿服務),同時結合量子密碼的優點與洋蔥路由的特性,在量子洋蔥路由(QOR)中,相較於傳統的洋蔥路由需要分別與路由一步一步地分享金鑰,在提出的量子洋蔥路由中,傳送者可以同時與傳遞路徑上的路由們同時分享金鑰,亦可匿名地傳送訊息並且保護的安全性,在量子隱匿服務(QHS)的環境下,基於量子洋蔥路由的特點,訊息傳送者與服務提供者同時皆可匿名,並且訊息的安全性亦可得到保護。

    Nowadays, the quantum computation, which is based on quantum mechanics, has been proven to be a serious threat against the security of the well-used public key cryptosystem (e.g. RSA). Precisely, the quantum computer has the ability of the powerful parallel process, where this feature causes the cryptosystems which are based on the difficulty of mathematic problems being cracked in polynomial time [1]. That inspires more research of the quantum cryptography to resolve the issue with several proposed applications, such as quantum key distribution (QKD), quantum secure direct communication (QSDC), and quantum secret sharing (QSS), and therefore the property of the quantum cryptography gradually attracts more focus in the field of the information security.
    Furthermore, the concept of the quantum network has been provided. The purpose of the network is to communicate between the distant participants, where the participants need to send the message with the help from relays or routers because the distance makes them unable to transmit directly. In the quantum network, especially, distributing the entangled state between the distant participants is one of the core issues since the distance causes the quantum energy decreasing, and additionally it may give an eavesdropper and the untrusted relay the opportunity to operate Man-in-the-Middle attack or obtain any useful information during the transmission.
    In addition, the anonymity is also a significant issue for information security. Apart from protecting the privacy of the message, the anonymity tends to hide the identity of the sender or the receiver. In that case, the feature of anonymity can be implemented in some applications in the classical cryptography, which require the anonymity, like voting, sending email, auction, and so on. Recently, the onion routing (Tor) [2] becomes the well-known protocol which provides the anonymity for the initiator (sender) and the service provider with the help of several onion routers. Besides, because of the onion encryption/decryption method, the transmitted message is untraceable preventing from others to track the path to find the initiator.
    Based on the above discussion, this thesis presents a distributed quantum network (DQN) with the untrusted relays in order to safely share the entanglement between each participant in long distance without the threat from Man-in-the-Middle attack. Moreover, two quantum anonymous environments, called quantum onion routing (QOR) and quantum hidden service (QHS) are also presented, which include the advantages of the quantum cryptography and the features of the onion routing. In the first anonymous environment, unlike the conventional onion routing an initiator can simultaneously share keys among the multiple routers with an efficient way, and then anonymously sends the message to a public service provider. On the other hand, the second one allows both initiator and the service provider to be anonymous.

    中文摘要 III Abstract V 誌謝 VII Content VIII List of Tables X List of Figures XI Chapter 1 Introduction 1 1.1 Overview of Quantum Cryptography 1 1.2 Motivation and Contribution 2 1.3 Thesis Structure 4 Chapter 2 Preliminaries 5 2.1 Quantum Theory 5 2.1.1 The Introduction of Quantum Bit 5 2.1.2 The Quantum Unitary Operations 6 2.1.3 The Properties of Entangled States 8 2.1.4 The Properties of Entanglement Swapping 10 2.2 Quantum Network 10 2.2.1 Distributed Quantum Network 11 2.2.2 Overview of Onion Routing 11 Chapter 3 Distributed Quantum Network 15 3.1 Proposed Scheme 15 3.1.1 Connection Phase 15 3.1.2 Entanglement-Sharing Phase 16 3.1.3 Applicability of the Proposed Scheme 22 3.2 Security Analysis 24 3.2.1 Resistance to Man-in-the-Middle Attack 24 3.2.2 Resistance to Intercept and Resend Attack 25 Chapter 4 Quantum Anonymous Environment with the Features of Onion Routing 26 4.1 Proposed Scheme 26 4.1.1 Phase I: Anonymous-Entanglement-and-Key-Sharing Phase 27 4.1.2 Phase II: Path-Establishment Phase 29 4.1.3 Phase III: Communication Phase 30 4.1.4 Quantum Hidden Service 39 4.2 Overall Analysis 42 4.2.1 Anonymity Analysis 42 4.2.2 Security Analysis 44 Chapter 5 Conclusions 46 Bibliography 47

    [1] P. W. Shor, "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer," SIAM J. Comput., vol. 26, pp. 1484-1509, 1997.
    [2] R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," in Proceedings of the 13th USENIX Security Symposium, 2004.
    [3] X. J. Lai and J. L. Massey, "A Proposal for a New Block Encryption Standard," Lecture Notes in Computer Science, vol. 473, pp. 389-404, 1991.
    [4] R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
    [5] C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
    [6] F. G. Deng, G. L. Long, and X. S. Liu, "Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block," Physical Review A, vol. 68, Oct 2003.
    [7] F. G. Deng, X. H. Li, C. Y. Li, P. Zhou, and H. Y. Zhou, "Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs," Physics Letters A, vol. 359, pp. 359-365, Dec 4 2006.
    [8] B. A. Nguyen, "Quantum dialogue," Physics Letters A, vol. 328, pp. 6-10, Jul 19 2004.
    [9] C. W. Tsai and T. Hwang, "Multi-party quantum secret sharing based on two special entangled states," Science China-Physics Mechanics & Astronomy, vol. 55, pp. 460-464, Mar 2012.
    [10] Y. G. Yang, J. Xia, X. Jia, L. Shi, and H. Zhang, "New Quantum Private Comparison Protocol without Entanglement," International Journal of Quantum Information, vol. 10, Sep 2012.
    [11] W. Liu and Y. B. Wang, "Quantum Private Comparison Based on GHZ Entangled States," International Journal of Theoretical Physics, vol. 51, pp. 3596-3604, Nov 2012.
    [12] W. W. Zhang, D. Li, K. J. Zhang, and H. J. Zuo, "A quantum protocol for millionaire problem with Bell states," Quantum Information Processing, vol. 12, pp. 2241-2249, Jun 2013.
    [13] G. H. Zeng and C. H. Keitel, "Arbitrated quantum-signature scheme," Physical Review A, vol. 65, Apr 2002.
    [14] M. Curty and N. Lutkenhaus, "Comment on "arbitrated quantum-signature scheme"," Physical Review A, vol. 77, Apr 2008.
    [15] G. H. Zeng, "Reply to "Comment on 'Arbitrated quantum-signature scheme' "," Physical Review A, vol. 78, Jul 2008.
    [16] Q. Li, W. H. Chan, and D. Y. Long, "Arbitrated quantum signature scheme using Bell states," Physical Review A, vol. 79, May 2009.
    [17] T. Hwang, Y. P. Luo, and S. K. Chong, "Comment on "Security analysis and improvements of arbitrated quantum signature schemes"," Physical Review A, vol. 85, May 24 2012.
    [18] X. F. Zou and D. W. Qiu, "Security analysis and improvements of arbitrated quantum signature schemes," Physical Review A, vol. 82, Oct 21 2010.
    [19] F. G. Deng, X. H. Li, C. Y. Li, P. Zhou, and H. Y. Zhou, "Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs," Physical Review A, vol. 72, Oct 2005.
    [20] Z. X. Man, Y. J. Xia, and N. B. An, "Quantum state sharing of an arbitrary multiqubit state using nonmaximally entangled GHZ states," European Physical Journal D, vol. 42, pp. 333-340, May 2007.
    [21] F. G. Deng, X. H. Li, C. Y. Li, P. Zhou, and H. Y. Zhou, "Quantum state sharing of an arbitrary two-qubit state with two-photon entanglements and Bell-state measurements," European Physical Journal D, vol. 39, pp. 459-464, Sep 2006.
    [22] D. Collins, N. Gisin, and H. De Riedmatten, "Quantum relays for long distance quantum cryptography," Journal of Modern Optics, vol. 52, pp. 735-753, Mar 20 2005.
    [23] W. Y. Wang, C. Wang, G. Y. Zhang, and G. L. Long, "Arbitrarily long distance quantum communication using inspection and power insertion," Chinese Science Bulletin, vol. 54, pp. 158-162, Jan 2009.
    [24] J. Dong and J. F. Teng, "Quantum key distribution protocol of mesh network structure based on n+1 EPR pairs," Journal of Systems Engineering and Electronics, vol. 21, pp. 334-338, Apr 2010.
    [25] M. Hayashi, "Prior entanglement between senders enables perfect quantum network coding with modification," Physical Review A, vol. 76, Oct 2007.
    [26] S. Y. Ma, X. B. Chen, M. X. Luo, X. X. Niu, and Y. X. Yang, "Probabilistic quantum network coding of M-qudit states over the butterfly network," Optics Communications, vol. 283, pp. 497-501, Feb 1 2010.
    [27] D. Leung, J. Oppenheim, and A. Winter, "Quantum Network Communication-The Butterfly and Beyond," IEEE Transactions on Information Theory, vol. 56, pp. 3478-3490, Jul 2010.
    [28] F. X. Xu, W. Chen, S. Wang, Z. Q. Yin, Y. Zhang, Y. Liu, et al., "Field experiment on a robust hierarchical metropolitan quantum cryptography network," Chinese Science Bulletin, vol. 54, pp. 2991-2997, Sep 2009.
    [29] X. T. Yu, J. Xu, and Z. C. Zhang, "Distributed wireless quantum communication networks," Chinese Physics B, vol. 22, Sep 2013.
    [30] X. T. Yu, Z. C. Zhang, and J. Xu, "Distributed wireless quantum communication networks with partially entangled pairs," Chinese Physics B, vol. 23, Jan 2014.
    [31] S. T. Cheng, C. Y. Wang, and M. H. Tao, "Quantum communication for wireless wide-area networks," IEEE Journal on Selected Areas in Communications, vol. 23, pp. 1424-1432, Jul 2005.
    [32] C. Elliott, "Building the quantum network," New Journal of Physics, vol. 4, Jul 12 2002.
    [33] F. H. Xu, B. Qi, Z. F. Liao, and H. K. Lo, "Long distance measurement-device-independent quantum key distribution with entangled photon sources," Applied Physics Letters, vol. 103, Aug 5 2013.
    [34] M. Zukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert, "Event-Ready-Detectors Bell Experiment Via Entanglement Swapping," Physical Review Letters, vol. 71, pp. 4287-4290, Dec 27 1993.
    [35] J. W. Pan, D. Bouwmeester, H. Weinfurter, and A. Zeilinger, "Experimental entanglement swapping: Entangling photons that never interacted," Physical Review Letters, vol. 80, pp. 3891-3894, May 4 1998.
    [36] B. Yurke and J. S. Denker, "Quantum Network Theory," Physical Review A, vol. 29, pp. 1419-1437, 1984.
    [37] J. I. Cirac, P. Zoller, H. J. Kimble, and H. Mabuchi, "Quantum state transfer and entanglement distribution among distant nodes in a quantum network," Physical Review Letters, vol. 78, pp. 3221-3224, Apr 21 1997.
    [38] C. Gobby, Z. L. Yuan, and A. J. Shields, "Quantum key distribution over 122 km of standard telecom fiber," Applied Physics Letters, vol. 84, pp. 3762-3764, May 10 2004.
    [39] T. Schmitt-Manderbach, H. Weier, M. Furst, R. Ursin, F. Tiefenbacher, T. Scheidl, et al., "Experimental demonstration of free-space decoy-state quantum key distribution over 144 km," Physical Review Letters, vol. 98, Jan 5 2007.
    [40] D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New Journal of Physics, vol. 4, Jul 12 2002.
    [41] H. G. Shan, H. T. Cheng, and W. H. Zhuang, "Cross-Layer Cooperative MAC Protocol in Distributed Wireless Networks," IEEE Transactions on Wireless Communications, vol. 10, pp. 2603-2615, Aug 2011.
    [42] I. F. Akyildiz and X. D. Wang, "A survey on wireless mesh networks," IEEE Communications Magazine, vol. 43, pp. S23-S30, Sep 2005.
    [43] M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, pp. 482-494, May 1998.
    [44] D. Goldschlag, M. Reed, and P. Syverson, "Onion Routing for anonymous and private Internet connections," Communications of the ACM, vol. 42, pp. 39-41, Feb 1999.
    [45] P. F. Syverson, M. G. Reed, and D. M. Goldschlag, "Onion routing access configurations," presented at the DARPA Information Survivability Conference and Exposition, 2000.
    [46] P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an analysis of onion routing security," Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, vol. 2009 of LNCS, pp. 96-114, 25-26 July 2000.
    [47] S. K. Chong and T. Hwang, "Quantum key agreement protocol based on BB84," Optics Communications, vol. 283, pp. 1192-1195, Mar 15 2010.
    [48] Y. G. Yang, J. Xia, X. Jia, and H. Zhang, "Comment on quantum private comparison protocols with a semi-honest third party," Quantum Information Processing, vol. 12, pp. 877-885, Feb 2013.
    [49] T. H. Lin, C. W. Yang, and T. Hwang, "Attacks and Improvement on "Quantum Direct Communication with Mutual Authentication"," International Journal of Theoretical Physics, vol. 53, pp. 597-602, Feb 2014.
    [50] Y. T. Chen and T. Hwang, "Comment on the "Quantum Private Comparison Protocol Based on Bell Entangled States"," International Journal of Theoretical Physics, vol. 53, pp. 837-840, Mar 2014.
    [51] J. S. Lin, C. W. Yang, and T. Hwang, "Quantum private comparison of equality protocol without a third party," Quantum Information Processing, vol. 13, pp. 239-247, Feb 2014.
    [52] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Physics Letters A, vol. 351, pp. 23-25, Feb 20 2006.
    [53] C. W. Yang and T. Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Information Processing, vol. 13, pp. 781-794, Mar 2014.

    下載圖示 校內:2024-01-01公開
    校外:2024-01-01公開
    QR CODE