Inventor(s)

Niranjan M MFollow

Abstract

Techniques presented herein propose method to establish quantum secure anonymous communication (e.g., in TOR networks) without having dedicated quantum secure hardware, also considering simple and cost-effective method. As per the presented method, Client<->Entry node, Client<->Middle node, Client<->Exit node exchanges secret seed value and PQPSK ID using McEliece algorithm (using Public-Private Key pair) over already established authenticated secure communication channels using 1W-AKE or hybridOR. The secret seed value and PQPSK ID shall be used to generate unique pair of PQPSK (Key, ID) using Quantum Key Generation service. At the end of all negotiation between the Client and the TOR nodes, symmetric keys (PQPSKs) are generated between all the nodes in the TOR network. Further, PQPSK is used to generate session keys for establishing quantum safe anonymous communications across TOR network.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS