Security in Quantum Networks as an Optimization Problem

被引:2
|
作者
Rass, Stefan [1 ]
Schartner, Peter [1 ]
机构
[1] Klagenfurt Univ, Inst Appl Informat, Syst Secur Grp, A-9020 Klagenfurt, Austria
关键词
MESSAGE TRANSMISSION;
D O I
10.1109/ARES.2009.84
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general framework for casting the problem of designing secure quantum networks into a classical optimization problem. We introduce a measure of risk that serves as upper bound on the probability of loosing a message to the adversary. Based on this results, we can transform the problem of secure network design into an optimization procedure, which opens the field for the entire framework of optimization theory to tackle the problem most efficiently The latter is particularly appealing, since we prove the problem to be NP-hard in general. Our methodology is formulated to yield results that have interpretations in probabilistic terms, but can be generalized to other settings in a straightforward manner. The modeling approach is simple, and naturally accounts for different notions of security, depending on the situation at hand. Furthermore, our results are not limited to security in quantum networks, as we rely on quantum cryptography only to the extent of securing links. Hence, the analysis is equally applicable for any (multipath) transmission setup, where information-theoretic security is demanded.
引用
收藏
页码:493 / 498
页数:6
相关论文
共 50 条
  • [41] Modeling and Optimization of RFID Networks Planning Problem
    Kong, Hongshan
    Yu, Bin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [42] Iterative quantum optimization with an adaptive problem Hamiltonian for the shortest vector problem
    Zhu, Yifeng Rocky
    Joseph, David
    Ling, Cong
    Mintert, Florian
    PHYSICAL REVIEW A, 2022, 106 (02)
  • [43] Topological optimization of quantum key distribution networks
    Alleaume, R.
    Roueff, F.
    Diamanti, E.
    Luetkenhaus, N.
    NEW JOURNAL OF PHYSICS, 2009, 11
  • [44] Hybrid Quantum Particle Swarm Optimization Algorithm for Combinatorial Optimization Problem
    Wang, Jiahai
    Zhou, Yalan
    GECCO 2007: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2007, : 185 - 185
  • [45] Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem
    Bertsimas, Dimitris
    Litvinov, Eugene
    Sun, Xu Andy
    Zhao, Jinye
    Zheng, Tongxin
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (01) : 52 - 63
  • [46] Optimization Algorithm and Data Security Problem in Distributed Information Systems
    Dardzinska-Glebocka, Agnieszka
    SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 116 - 120
  • [47] Secure routing in sensor networks: Security problem analysis and countermeasures
    Mun, Y
    Shin, C
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 1, 2005, 3480 : 459 - 467
  • [48] Virtual Private Networks in the Quantum Era: A Security in Depth Approach
    Schatz, David
    Altheide, Friedrich
    Koerfgen, Hedwig
    Rossberg, Michael
    Schaefer, Guenter
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 486 - 494
  • [49] Hybrid Conventional and Quantum Security for Software Defined and Virtualized Networks
    Aguado, Alejandro
    Lopez, Victor
    Martinez-Mateo, Jesus
    Szyrkowiec, Thomas
    Autenrieth, Achim
    Peev, Momtchil
    Lopez, Diego
    Martin, Vicente
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2017, 9 (10) : 819 - 825
  • [50] Resource Optimization for Quantum Dynamics with Tensor Networks: Quantum and Classical Algorithms
    Dwivedi, Anurag
    Lopez-Ruiz, Miguel Angel
    Iyengar, Srinivasan S.
    JOURNAL OF PHYSICAL CHEMISTRY A, 2024, 128 (32): : 6774 - 6797