We consider the problem of constructing an unconditionally secure cipher with a short key for the case where the probability distribution of encrypted messages is unknown. Note that unconditional security means that an adversary with no computational constraints can only obtain a negligible amount of information ("leakage") about an encrypted message (without knowing the key). Here, we consider the case of a priori (partially) unknown message source statistics. More specifically, the message source probability distribution belongs to a given family of distributions. We propose an unconditionally secure cipher for this case. As an example, one can consider constructing a single cipher for texts written in any of the languages of the European Union. That is, the message to be encrypted could be written in any of these languages.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10606915 | PMC |
http://dx.doi.org/10.3390/e25101406 | DOI Listing |
npj Quantum Inf
December 2024
ETH Zurich, Department of Physics, Institute for Quantum Electronics, Optical Nanomaterial Group, Auguste-Piccard-Hof, 1, 8093 Zurich, Switzerland.
Optical quantum communication technologies are making the prospect of unconditionally secure and efficient information transfer a reality. The possibility of generating and reliably detecting quantum states of light, with the further need of increasing the private data-rate is where most research efforts are focusing. The physical concept of entanglement is a solution guaranteeing the highest degree of security in device-independent schemes, yet its implementation and preservation over long communication links is hard to achieve.
View Article and Find Full Text PDFNat Commun
August 2024
Walther-Meißner-Institut, Bayerische Akademie der Wissenschaften, Garching, Germany.
Security of modern classical data encryption often relies on computationally hard problems, which can be trivialized with the advent of quantum computers. A potential remedy for this is quantum communication which takes advantage of the laws of quantum physics to provide secure exchange of information. Here, quantum key distribution (QKD) represents a powerful tool, allowing for unconditionally secure quantum communication between remote parties.
View Article and Find Full Text PDFSci Rep
June 2024
Computer Science and Engineering Department, National University of Science and Technology POLITEHNICA Bucharest, Bucharest, 060042, Romania.
Nowadays QKD plays a critical role in unconditionally-secure and quantum-safe key distribution. Commercially available QKD devices are getting more popular for institutional and governmental national and international networks, but are expensive and offer limited key rates. We provide a formalization of QKD-generated key forwarding and redistribution at the KMS level by extending the network graph of physical QKD links to the complete graph with logical links, and we investigate its application on three practical scalable scenarios (all-to-all, one-to-all, one-to-one).
View Article and Find Full Text PDFSci Rep
November 2023
Department of Computing, Imperial College London, London, SW7 2AZ, UK.
Deep neural networks (DNNs) are phenomenally successful machine learning methods broadly applied to many different disciplines. However, as complex two-party computations, DNN inference using classical cryptographic methods cannot achieve unconditional security, raising concern on security risks of DNNs' application to sensitive data in many domains. We overcome such a weakness by introducing a quantum-aided security approach.
View Article and Find Full Text PDFEntropy (Basel)
September 2023
Federal Research Center for Information and Computational Technologies, Novosibirsk 630090, Russia.
We consider the problem of constructing an unconditionally secure cipher with a short key for the case where the probability distribution of encrypted messages is unknown. Note that unconditional security means that an adversary with no computational constraints can only obtain a negligible amount of information ("leakage") about an encrypted message (without knowing the key). Here, we consider the case of a priori (partially) unknown message source statistics.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!