In a paper published in the journal IScience, researchers discussed the security vulnerabilities of Internet of Vehicles (IoV) networks against future quantum computers due to Shor's algorithm. They proposed a continuous-variable quantum secure direct communication (CV-QSDC) protocol using orbital angular momentum (OAM) as the information carrier to resist quantum attacks. The protocol leveraged the compatibility of continuous-variable quantum systems with standard telecommunication technology and the higher information capacity of OAM eigenstates.
Related Work
Past work on IoV security highlighted vulnerabilities in cryptographic algorithms against quantum computing, particularly through Shor’s algorithm, which compromised Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). Researchers proposed QSDC as a solution, eliminating key distribution vulnerabilities using a single quantum communication channel.
Initial breakthroughs in QSDC protocols, measurement-device-independent (MDI) structures, and high-dimensional encoding improved security and efficiency, establishing the basis for discrete-variable (DV) and continuous-variable (CV) quantum communication in IoV networks.
Quantum Security in IoV
Quantum IoV security has emerged as a crucial concern due to the vulnerabilities posed by quantum computing advancements. Traditional cryptographic algorithms like RSA and ECC rely on complex mathematical problems, such as integer factorization and discrete logarithms, for security. However, Shor’s algorithm has shown that these methods can be compromised by future quantum computers, rendering them theoretically insecure.
Researchers proposed QSDC as a promising alternative to address this issue. QSDC eliminates the need for pre-shared keys, a major vulnerability in classical systems, using a single quantum communication channel to transmit secret messages directly between trusted parties. This approach significantly reduces the risk of key distribution attacks and enhances overall security for IoV networks.
Key breakthroughs in developing QSDC include the two-step protocol, which further streamlined communication processes, and the introduction of MDI structures, which mitigated vulnerabilities related to device imperfections. High-dimensional encoding also improved the security and efficiency of these protocols, making them more robust against potential eavesdropping attacks.
These advancements laid the foundation for DV and CV quantum communication systems in IoV networks. DV systems rely on single-photon detection, while CV systems use continuous light and homodyne detectors, providing better compatibility with existing telecommunication technologies. Together, they offer a secure framework for the future of IoV communication in the face of quantum threats.
Asymptotic and Finite-Size Security
The section on asymptotic regime security in the CV-QSDC protocol discusses how detection light beams (S1 and S2) are transmitted through the same atmospheric turbulence channel, ensuring the protocol's security. The entanglement-based (EB) model is utilized to analyze the effective information of detection light.
Alice prepares a pair of two-mode squeezed states, and the covariance matrix is defined to reflect the state after passing through the turbulence. Key parameters, such as transmittance and excess noise, are introduced to represent the system's characteristics, allowing for the evaluation of effective information about atmospheric turbulence and noise levels.
The effective information for the CV-QSDC protocol with reverse reconciliation is mathematically expressed, considering mutual information, detection-added noise, and total noise. The Holevo quantity is also defined, facilitating security assessment against collective attacks. This framework provides insights into the protocol's performance under various noise conditions, revealing its robustness against excess noise.
Results illustrate that the effective information remains relatively stable across different scenarios, reinforcing the protocol's security in practical applications. Transitioning to finite-size security, the discussion highlights that previous effective information calculations assumed infinite signals, which is not feasible in practice.
Instead, this section focuses on a finite-size regime, where Alice and Bob exchange a finite number of signals. The effective information is redefined to account for the number of signals utilized for parameter estimation and privacy amplification, considering the implications of finite signal lengths on security.
The relationship between effective information and transmission distance is explored. It demonstrates that while the maximum effective details in the finite-size regime are lower than those in the asymptotic regime, it provides a more realistic representation of the protocol's capabilities. As the number of signals increases, the transmission distance improves, but it remains bounded by practical limitations. Overall, the findings provide a solid foundation for implementing QSDC protocols in IoV networks, emphasizing the balance between theoretical security and real-world applicability.
Conclusion
To summarize, this study introduced a CV-QSDC protocol for IoV networks to deliver secret messages directly while ensuring compatibility with standard telecommunication technology for imperceptibility and security. OAM eigenstates served as information carriers, boosting wireless communication capacity.
The protocol calculated effective information and maximum transmission distance in both asymptotic and finite-size regimes, with the latter providing a more realistic perspective. Information block mapping was utilized in the message transmission stage to reduce security risks from one-eigenstate distribution, emphasizing its importance for emergency communication scenarios. The protocol demonstrated significant potential for enhancing secure communications in various practical applications.
Journal Reference
Zhao, W., et al. (2024). Quantum Secure Direct Communication in Internet of Vehicles. IScience, 110942–110942. DOI: 10.1016/j.isci.2024.110942, https://www.sciencedirect.com/science/article/pii/S2589004224021679
Disclaimer: The views expressed here are those of the author expressed in their private capacity and do not necessarily represent the views of AZoM.com Limited T/A AZoNetwork the owner and operator of this website. This disclaimer forms part of the Terms and conditions of use of this website.