A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems

The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific and industrial communities. Based on principles of quantum mechanics, it can provide unconditional security in key exchanges over end-to-end communication channels. Information-theoretically secure (ITS) authentication, the compulsory procedure of QKD systems, avoids the man-in-the-middle attack during the security key generation. In this paper, we propose a novel family of almost strongly universal (ASU) hash functions based on number-theoretic transforms (N-ASU), and prove that N-ASU hash functions can meet the high security requirement of an ITS authentication procedure. With such N-ASU hash functions, we propose a novel efficient NTT-based authentication algorithm (N-Auth) for QKD systems. Such a solution offers nearly the same security guarantees provided by the available authentication algorithms built upon ASU hash functions, but is characterized by a much lower computational complexity. The experimental results show that the N-Auth algorithm can fully meet the real-time and high-performance demands of modern 10-GHz QKD systems, making it a viable solution for the implementation of industrial-strength unconditionally secure broadband communication solutions.

[1]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[2]  Aysajan Abidin,et al.  Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions , 2013 .

[3]  Wei Chen,et al.  2 GHz clock quantum key distribution over 260 km of standard telecom fiber. , 2012, Optics letters.

[4]  Hugo Krawczyk,et al.  UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.

[5]  Bert den Boer A Simple and Key-Economical Unconditional Authentication Scheme , 1993, J. Comput. Secur..

[6]  Xiongfeng Ma,et al.  Universally composable and customizable post-processing for practical quantum key distribution , 2011, Comput. Secur..

[7]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[8]  Hugo Krawczyk,et al.  LFSR-based Hashing and Authentication , 1994, CRYPTO.

[9]  Hugo Krawczyk,et al.  MMH: Software Message Authentication in the Gbit/Second Rates , 1997, FSE.

[10]  Douglas R Stinson,et al.  Universal hash families and the leftover hash lemma, and applications to cryptography and computing , 2010 .

[11]  Paolo Villoresi,et al.  Experimental quantum key distribution with finite-key security analysis for noisy channels , 2013, Nature Communications.

[12]  Thomas Johansson,et al.  On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.

[13]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[14]  G. Chulkova,et al.  Superconducting single-photon detectors for GHz-rate free-space quantum communications , 2002, SPIE Optics + Photonics.

[15]  Gilles Van Assche,et al.  Quantum cryptography and secret-key distillation , 2006 .

[16]  A. Tajima,et al.  High-Speed Quantum Key Distribution System for 1-Mbps Real-Time Key Generation , 2012, IEEE Journal of Quantum Electronics.

[17]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.