Abstract
Quantum Key Distribution (QKD) technology, based on principles of quantum mechanics, can generate unconditional security keys for communication parties. Information-theoretically secure (ITS) authentication, the compulsory procedure of QKD systems, avoids the man-in-the-middle attack during the security key generation. The construction of hash functions is the paramount concern within the ITS authentication. In this extended abstract, we proposed a novel Efficient NTT-based ε -Almost Strongly Universal Hash Function. The security of our NTT-based ε -ASU hash function meets \( \varepsilon \le L\left( {n + 1} \right)/2^{n - 2} \) . With ultra-low computational amounts of construction and hashing procedures, our proposed NTT-based ε -ASU hash function is suitable for QKD systems.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
With the rapid development of computing technologies, the importance of secure communication is growing daily [21–24]. Unlike conventional cryptography which based on the computational complexity, Quantum Key Distribution (QKD) can achieve the unconditional security communication [1, 2, 18–20]. By transmitting security key information with quantum states, the final key generated by QKD system is information-theoretically secure (ITS), which is guaranteed by the non-cloning theorem and measuring collapse theorem in quantum physics [3, 4]. Nowadays, QKD has been one of the research focuses around the world. In recent years, the famous QKD network projects mainly include SECOQC in Europe [5], UQCC in Tokyo [6] and NQCB in China [7] and so on.
ITS authentication is the compulsory procedure of QKD system and also the key procedure which ensures the security of generated keys between communication parties [4, 8]. Otherwise, QKD is vulnerable to the man-in-the-middle attack [9–11]. The main challenge about the research of ITS authentication is the construction of hash functions which are suitable for ITS authentication with less security key [9, 12–14].
Usually, ε -Almost Strongly Universal ( ε -ASU) hash functions can be used to construct ITS authentication schemes in a natural way. Majority construction schemes focus on the ε -ASU 2 hash function families, such as Wegman-Carter’s and Krawczyk’s construction schemes [13, 14]. Nowadays, the photon transmission frequency has reached to about ten GHz [15, 16]. With heavy computational amounts, ITS authentication schemes which based on ε -ASU 2 hash functions cannot meet the high performance requirement of QKD systems [9, 13, 17].
In this extended abstract, with NTT technology, we proposed a novel Efficient ε -Almost Strongly Universal Hash Function. With the special features of number-theoretic transforms (NTT) technology, our ε -ASU hash function family is constructed in the prime ring \( \varvec{Z}_{p}^{L} \) . In order to construct the NTT-based ε -ASU hash function efficiently, we assume that \( L = 2^{\lambda } \) , and the prime number \( p = \upsilon L + 1 \) . We assume that the set of all messages is \( R \) , where \( R \in \varvec{Z}_{p}^{L} \) with length of \( L \) , and the length of authentication tag is \( n \) , where \( n = \beta \left\lceil {\log_{2} p} \right\rceil \) . The security of our NTT-based ε -ASU hash function meets \( \varepsilon \le L\left( {n + 1} \right)/2^{n - 2} \) and the consumed key length of ITS authentication scheme is less than \( 3n + 1 \) .
2 NTT-Based Almost Strongly Universal Hash Function
Since the construction has to consume a very long key, Gilles’s NTT-based almost universal hash function is not suitable for ITS authentication [18]. With a partially known security key and a LFSR structure [13], a random bit stream can be generated to construct the NTT-based almost strongly universal (NASU) hash functions.
Let \( \varvec{R} \) be the set of messages, where \( \varvec{R} \in \varvec{Z}_{p}^{L} \) . We take only the first \( \beta \) elements of the hashing result. Let \( f\left( x \right) \) be an irreducible polynomial with degree \( \beta \left\lceil {\log_{2} p} \right\rceil \) of \( GF\left( 2 \right) \) and \( \varvec{s}_{{\varvec{init}}} = \left( {s_{0} ,s_{1} , \cdots ,s_{{\beta \left\lceil {\log_{2} p} \right\rceil - 1}} } \right)^{T} \) be an initial state of the LFSR structure defined by the feedback function \( f\left( x \right) \) . \( \varvec{s}_{{\varvec{init}}} \) and \( f\left( x \right) \) are both generated from the partially known key with length of \( 2\beta \left\lceil {\log_{2} p} \right\rceil + 1 \) . Let \( \varvec{f} = \left( {f_{0} ,f_{1} , \cdots ,f_{{\beta \left\lceil {\log_{2} p} \right\rceil - 1}} } \right)^{T} \) be the coefficient vector of \( f\left( x \right) \) and \( \varvec{s}_{{\left[ {i - \beta \left\lceil {\log_{2} p} \right\rceil ,i - 1} \right]}} = \left( {s_{{i - \beta \left\lceil {\log_{2} p} \right\rceil }} ,s_{{i - \beta \left\lceil {\log_{2} p} \right\rceil + 1}} , \cdots ,s_{i - 1} } \right)^{T} \) , where \( i \ge \beta \left\lceil {\log_{2} p} \right\rceil \) .
Thus, we can gain the random bit
Let \( 1 \le \beta \le L \) and \( K = \left( {2^{0} ,2^{1} , \cdots ,2^{{\left\lceil {\log_{2} p} \right\rceil - 1}} } \right) \) . For \( \varvec{C,R} \in \varvec{Z}_{p}^{L} \) , let \( h_{\text{C}} \left( \varvec{R} \right) = \left( {F^{ - 1} \left( {C \cdot R} \right)} \right)_{0,1, \cdots ,\beta - 1} \) be the inverse NTT of their component-wise product, taking only the \( \beta \) first elements of the result. Assume that \( u = \left\lceil {\log_{2} p} \right\rceil \) , we define that the set
is an almost strongly universal family of hash functions with \( \varepsilon \le \left( {L + 2L\beta \left\lceil {\log_{2} p} \right\rceil + 2} \right)/2^{{\beta \left\lceil {\log_{2} p} \right\rceil }} \) . Assume that \( n = \beta u \) , we have \( \varepsilon \le \left( {L + 2nL + 2} \right)/2^{n} \) .
3 Potential Advantages
Comparing with ASU 2 hash functions, our proposed NASU hash functions have the following potential advantages:
-
(a)
NASU hash functions can be easily constructed with a partially known security key and a LFSR structure.
-
(b)
With the special features of number-theoretic transforms (NTT) technology, the computational amounts of our NASU hashing procedure is much less than Krawczyk’s scheme and other ASU 2 hash functions.
-
(c)
Treating the elements of input messages as non-binary integers of the ring \( \varvec{Z}_{p}^{L} \) , our proposed NTT-based ε -ASU hash function is very suitable for ITS authentication in QKD systems.
In the future, we will explore the detailed security proof of NASU hash functions and its deployment within the QKD system.
References
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81 , 1301–1350 (2009)
Wang, L., Chen, L., Ju, L., Xu, M., Zhao, Y., Chen, K., Chen, Z., Chen, T.-Y., Pan, J.-W.: Experimental multiplexing of quantum key distribution with classical optical communication. Appl. Phys. Lett. 106 , 081108 (2015)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, New York (Year)
Ma, X., Fung, C.-H.F., Boileau, J.C., Chau, H.F.: Universally composable and customizable post-processing for practical quantum key distribution. Comput. Securtiy 30 , 172–177 (2011)
Leverrier, A., Karpov, E., Grangier, P., Cerf, N.J.: Unconditional security of continuous-variable quantum key distribution. arXiv preprint arXiv:0809.2252 (2008)
Sasaki, M., Fujiwara, M., et al.: Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 19 , 10387–10409 (2011)
Ma, X.: Practical Quantum key Distribution post-processing (2011)
Abidin, A.: Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions. Department of Electrical Engineering, vol. Ph.D. Linkoping University (2013)
Pacher, C., Abidin, A., Lorunser, T., Peev, M., Ursin, R., Zeilinger, A., Larsson, J.-A.: Attacks on quantum key distribution protocols that employ non-ITS authentication. arXiv preprint arXiv:1209.0365 (2012)
Ioannou, L.M., Mosca, M.: Unconditionally-secure and reusable public-key authentication. arXiv preprint arXiv:1108.2887 (2011)
Portmann, C.: Key Recycling in Authentication. arXiv preprint arXiv:1202.1229 (2012)
Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129–139. Springer, Heidelberg (1994)
Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22 , 265–279 (1981)
Wang, S., Chen, W., Guo, J.: YIn, Z., Li, H., Zhou, Z., Guo, G., Han, Z.: 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37 , 1008–1010 (2012)
Tanaka, A., Fujiwara, M., et al.: High-speed quantum key distribution system for 1-Mbps real-time key generation. IEEE J. Quant. Electron. 48 , 542–550 (2012)
Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, pp. 106–112. ACM (Year)
Liu, B., Zhao, B., Wei, Z., et al.: Qphone: a quantum security VoIP phone. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM. ACM, pp. 477–478 (2013)
Liu, B., Zhao, B., Liu, B., et al.: A security real-time privacy amplification scheme in QKD system. J. UCS. 19 (16), 2420–2436 (2013)
Sun, S., Jiang, M., Ma, X., Li, C., Liang, L.: Hacking on decoy-state quantum key distribution system with partial phase randomization, Scientific Reports (2013)
Liu, Y., Peng, W., Jinshu, S.: A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Netw. 7 (11), 2201–2210 (2014)
Roland, R., Zhdanova, M., Repp, J.: Security compliance tracking of processes in networked cooperating systems. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6 (2), 21–40 (2015)
Kotenko, I.: Guest editorial: security in distributed and network-based computing. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6 (2), 1–3 (2015)
Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6 (2), 78–97 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Liu, B., Zhao, B., Wu, C., Yu, W., You, I. (2015). Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution. In: Khalil, I., Neuhold, E., Tjoa, A., Xu, L., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2015. Lecture Notes in Computer Science(), vol 9357. Springer, Cham. https://doi.org/10.1007/978-3-319-24315-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-24315-3_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24314-6
Online ISBN: 978-3-319-24315-3
eBook Packages: Computer ScienceComputer Science (R0)