Computer Science ›› 2020, Vol. 47 ›› Issue (7): 314-321.doi: 10.11896/jsjkx.190500168

• Information Security • Previous Articles     Next Articles

Anti-eavesdropping Network Coding Based on Quantum GHZ State

XU Guang-xian, CUI Jun-jie   

  1. School of Electronic and Information Engineering,Liaoning Technical University,Huludao,Liaoning 125105,China
  • Received:2019-05-29 Online:2020-07-15 Published:2020-07-16
  • About author:XU Guang-xian,born in 1977,Ph.D candidate,professor.His main research interests include network code and information processing.
  • Supported by:
    This work was supported by the National Science and Technology Support Program (2013BAH12F02) and Liaoning Province University Outstanding Young Scholar Growth Plan Project (LJQ2014029)

Abstract: The coding efficiency of classical network coding is inefficient during transmission and easy to be bugged.Although Hayashi’s proposal of sharing EPR at the transmitter improves the coding efficiency for information transmission,it can not rea-lize the complete recovery of transmitted information,and the information is not safely disposed,so it is easy to be bugged.To this end,based on the three-particle maximally entangled GHZ state,a quantum network coding scheme is proposed to prevent information being eavesdropped by using the quantum no-cloning theorem and teleportation.Starting from the classical butterfly network coding,the direct product operation is carried out on particles to be sent and the GHZ state particles at the sending end.Then bell measurement is performed on the calculated particles,and the precoding information can be obtained according to the measurement results.The precoding information is transmitted to intermediate nodes,and auxiliary particles used for measurement are introduced at the receiving end.Then,quantum entanglement computation is performed on the received particles,and joint unitary operation is performed on particle clusters.Finally,based on the coding information,corresponding unitary matrix is selected to restore particle clusters.Experimental data shows that the single transmission success rate of GHZ-based quantum network coding has been significantly improved,in terms of encoding efficiency,the cross transmission of quantum information in the butterfly network can be completed with only 6 qubits.In terms of security,the probability of detecting whether the information is bugged has improved.It proves that the proposed scheme improves the coding efficiency of the network coding system and effectively solves the bugging problem of information transmission.

Key words: Eavesdropping attack, Network coding, No-cloning, Quantum network coding, Teleportation

CLC Number: 

  • TP391.9
[1]AHLSWEDE R,CAI N,LI S Y R,et al.Network information flow [J].IEEE Transactions on Information Theory,2000,6(4):1204-1216.
[2]MEI M D.Research on secure network coding [D].Nanjing:Nanjing University of Posts and Telecommunications,2018.
[3]NGUYEN H V,BABAR Z,ALANIS D,et al.Towards theQuantum Internet:Generalised Quantum Network Coding for Large-scale Quantum Communication Networks[J].IEEE Access,2017,PP(99):17288-17308.
[4]GULATI M,SIDDHARTHA S,VEDI Y,et al.Genet-ic-Algorithm Based Planar Antenna Design[C]//International Conference on Wireless Communications,ignal Processing and Networking (WiSPNET).2018:1-2.
[5]AKIBUE S,MURAO M.Network Coding for Distributed Quantum Computation Over Cluster and Butterfly Networks[J].IEEE Transactions on Information Theory,2016,62(11):6620-6637.
[6]JIANG M,ZHOU S,DING M X.Quantum network codingbased on remote state preparation of arbitrary two-qubit states[C]//2017 36th Chinese Control Conference (CCC).2017:9757-9760.
[7]BENNETT C H,BRASSARD G,REPEAU C,et al.Teleportaion an Un known Quantum State oia Dual Claasical and EPR [J].Physical Review Letters,1993,7(13):1895-1899.
[8]QI S,ZHENG H,QIAOYAN W,et al.Quantum blind signature based on Two-State Vector Formalism[J].Optics Communications,2010,283(21):4408-4410.
[9]NISHIMURA H.Quantum Network Coding-How can network coding he applied to quantum information?[C]//2013 International Symposium on Network Coding (NetCod).2013:1-5.
[10]DURKOVIC S,CICA Z.Load balanced Birkhoff-von Neumann switch with output congestion detection[C]//2017 13th International Conference on Advanced Technologies,Systems and Services in Telecommunications (TELSIKS).2017:283-286.
[11]HAYASHI M,IWAMA K.Quantum network coding[M]//Thomas W,Weil P,eds.STACS 2007.Berlin:Springer,2007.
[12]LIU G J.An efficient security network coding scheme for anti-eavesdropping and anti-pollution [J].Electronic Design Engineering,2008,7(26):21-26.
[13]LEUNG D,OPPENHEIM J,WINTER A.Quantum NetworkCommunication-The Butterfly and Beyond[J].IEEE Transactions on Information Theory,2010,56(7):3478-3490.
[14]MA S Y,CHEN X B,LUO M X.Probabilistic quantum network coding of M qubit states over the butterfly network[J].Optics Communications,2010,283(3):497-501.
[15]LIU G,LIU B,LIU X,et al.Low-complexity secure networkcoding against wiretapping using intra/inter-generation coding[J].China Communications,2015,12(6):116-125.
[16]PIRANDOLA S,EISERT J,WEEDBROOK C,et al.Advances in quantum teleportation[J].Nature Photonics,2015,9(10):641-652.
[17]HAYASHI,MASAHITO.Prior entanglement between senders enables perfect quantum network coding with modification[J].Physical Review A,2007,76(4):040301.
[18]INAMORI H,RALLAN L,VEDRAL V.Security of EPR-based Quantum Cryptography against Incoherent Symmetric Attacks[J].Journal of Physics A General Physics,2001,34(35):6913-6918.
[19]MICHAEL A,ISAAC L.quantum computation and quantum information [M].Beijing:Tsinghua University Press,2004:65-66.
[20]HEN H,ZHANG J,ZHANG C.Chaos Updating Rotated Gates Quantum-inspired Genetic Algorithm [C]//International Conference on Communicattions,Circuits and Systems.2004:1108-1112.
[1] HAN Xiao-dong, GAO Fei, ZHANG Li-wei. Novel Real-time Algorithm for Critical Path of Linear Network Coding [J]. Computer Science, 2020, 47(9): 232-237.
[2] HONG Hai-cheng,CHEN Dan-wei. Replica Dynamic Storage Based on RBEC [J]. Computer Science, 2020, 47(2): 313-319.
[3] SONG Ying, ZHONG Xian, SUN Bao-lin, GUI Chao. Sliding Window-based Network Coding Cooperative Algorithm in MANET [J]. Computer Science, 2020, 47(11): 322-326.
[4] ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177.
[5] JI Bao-feng, WANG Yi-dan, XING Bing-bing, LI Yu-qi, GAO Hong-feng, HAN Cong-cheng. Enhancement Method of Throughput in Ultra-dense Network Based on Hierarchical Multi-hop Physical Layer Network Coding [J]. Computer Science, 2019, 46(7): 56-60.
[6] CHEN Jie, XIE Xian-zhong, HUANG Qian, LI Jia. Network Coding TCP Protocol Based on Cross-layer Optimization in Wireless Vehicle Networks [J]. Computer Science, 2019, 46(2): 88-94.
[7] GUO Bin, YU Dan-dan, LU Wei, HUANG Ming-he, ZENG Ya-lin. Selective Network Coding Strategy Based on Packet Loss Prediction [J]. Computer Science, 2019, 46(11A): 399-404.
[8] HAN Li and QIAN Huan-yan. Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network [J]. Computer Science, 2018, 45(5): 69-74.
[9] LIU Yan-tao, LIU Heng. Cloud Storage System Based on Network Coding [J]. Computer Science, 2018, 45(12): 293-298.
[10] LU Ming-yue, GUO Dao-xing and NIU He-hao. New Physical Layer Network Coding Denoising Mapping Algorithm Based on MQAM [J]. Computer Science, 2017, 44(Z6): 284-287.
[11] XU Jing, LIU Yan-tao, XIA Gui-yang and Yasser MORGAN. Network Coding Based Topology Inference:A Survey [J]. Computer Science, 2016, 43(Z6): 242-248.
[12] TAO Wen, JIN Ling, BAI Guang-wei and SHEN Hang. Performance Model for Network-coding-aware Opportunistic Routing in Wireless Networks [J]. Computer Science, 2016, 43(9): 156-159.
[13] WANG Zhen-chao, CAI Zhi-jie and XUE Wen-ling. Opportunistic Routing Algorithm Based on Partial Network Coding for Wireless Networks [J]. Computer Science, 2016, 43(9): 152-155.
[14] WANG Zhen-chao, CAI Zhi-jie and XUE Wen-ling. Network Coding Based Energy-aware Routing Protocol for Ad Hoc Network [J]. Computer Science, 2016, 43(7): 106-110.
[15] WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141.
Full text



No Suggested Reading articles found!