TY - JOUR
T1 - Long-Term Secure Distributed Storage Using Quantum Key Distribution Network with Third-Party Verification
AU - Fujiwara, Mikio
AU - Nojima, Ryo
AU - Tsurumaru, Toyohiro
AU - Moriai, Shiho
AU - Takeoka, Masahiro
AU - Sasaki, Masahide
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2022
Y1 - 2022
N2 - The quantum key distribution (QKD) network with Vernam's one-time pad encryption and secret sharing are powerful security tools to realize an information theoretically secure (ITS) distributed storage system. In the work of Fujiwara et al., a single-password-authenticated secret sharing (SPSS) scheme based on the QKD network and Shamirs secret sharing was experimentally demonstrated; it confirmed ITS data transmission, storage, authentication, and integrity. To achieve data integrity, an ITS message authentication code (MAC) tag is employed, and a data owner of the secret sharing performs both the MAC tag generation and verification. However, for a scenario in which the data owner and end users are different entities, the above approach may not work, since the data owner can cheat the end users. In this article, we resolve this problem by proposing an ITS integrity protection scheme employing a third-party verification with time-stamp. The ITS integrity protection is realized by two steps: integrity check by the data owner at data reconstruction and data integrity certification by the data owner, the end user, and the third-party verifier using a MAC based on universal2 hash function and random number provided from the QKD network. In addition to introducing the third-party verifier, we institute 'a trusted calculator,' which computes shares of the data and MAC tags and sends MAC tags to the third-party verifier. The random number used in calculation is stored in the trusted calculator. We implement this scheme on the SPSS system installed in the Tokyo QKD Network.
AB - The quantum key distribution (QKD) network with Vernam's one-time pad encryption and secret sharing are powerful security tools to realize an information theoretically secure (ITS) distributed storage system. In the work of Fujiwara et al., a single-password-authenticated secret sharing (SPSS) scheme based on the QKD network and Shamirs secret sharing was experimentally demonstrated; it confirmed ITS data transmission, storage, authentication, and integrity. To achieve data integrity, an ITS message authentication code (MAC) tag is employed, and a data owner of the secret sharing performs both the MAC tag generation and verification. However, for a scenario in which the data owner and end users are different entities, the above approach may not work, since the data owner can cheat the end users. In this article, we resolve this problem by proposing an ITS integrity protection scheme employing a third-party verification with time-stamp. The ITS integrity protection is realized by two steps: integrity check by the data owner at data reconstruction and data integrity certification by the data owner, the end user, and the third-party verifier using a MAC based on universal2 hash function and random number provided from the QKD network. In addition to introducing the third-party verifier, we institute 'a trusted calculator,' which computes shares of the data and MAC tags and sends MAC tags to the third-party verifier. The random number used in calculation is stored in the trusted calculator. We implement this scheme on the SPSS system installed in the Tokyo QKD Network.
KW - Quantum key distribution (QKD)
KW - Tokyo QKD Network
KW - secret sharing (SS)
KW - third-party verification
KW - time-stamp
UR - http://www.scopus.com/inward/record.url?scp=85124669971&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85124669971&partnerID=8YFLogxK
U2 - 10.1109/TQE.2021.3135077
DO - 10.1109/TQE.2021.3135077
M3 - Article
AN - SCOPUS:85124669971
SN - 2689-1808
VL - 3
JO - IEEE Transactions on Quantum Engineering
JF - IEEE Transactions on Quantum Engineering
ER -