Professional Documents
Culture Documents
Qan NL V2
Qan NL V2
Research Outline
Nomi Lae
Director: Hyundong Shin
1 Motivation
In response to growing concerns about privacy and security in the digital age, Quantum
Anonymous Networking (QAN) has emerged as a groundbreaking solution. Traditional
encryption methods are increasingly vulnerable to advanced attacks, necessitating innovative
alternatives rooted in the principles of quantum mechanics. QAN represents a paradigm shift
by leveraging quantum entanglement and superposition to ensure secure and untraceable
communication. Instead of directly transmitting data across the network, QAN establishes
connections through entanglement, providing a novel approach to safeguarding information.
The unique characteristics of quantum states enable the detection of potential interception or
eavesdropping in communications. This research aims to redefine quantum communication
protocols, addressing the weaknesses of current networking infrastructures and paving the way
for the establishment of anonymous communication systems.
1
Figure 0.1: (Source: [1]) An Anonymous 6G URLLC network with the CCT protocol. The cloud server starts
the protocol by preparing a GHZ state followed by the Edge servers execute the counterfactual controlled
unitary operation to anonymously broadcast their classical information.
2
2 Research Significance:
The research initiative’s power lies in the ability to revolutionize secure communication.
Quantum Anonymous Networking not only introduces heightened levels of anonymity but
also holds significant implications for industries like banking, health-care, and government,
where maintaining confidentiality is paramount. This breakthrough could pave the way for
the development of cryptographic systems resilient against quantum threats, enhancing the
security landscape of digital networks through advancements in quantum communication
protocols. Anticipated outcomes from this study include substantial progress in quantum
technology and the establishment of a novel benchmark for secure, anonymous communication
in the digital sphere.
3
Figure 0.2: (Source: [3]) Different phase during the relay. Phase 1:beginning. Phase 2:entanglement
swapping. Phase 3:sender/seceiver C-NOT. Phase 4:ending state.
4
Figure 0.3: (Source: [4]) Schematic diagram for the anonymous entanglement protocol
3 Applications:
5
• As the quantum internet emerges to fulfill the escalating need for secure and private
communication, the development of quantum anonymous protocols becomes pivotal
in ensuring user anonymity and safeguarding sensitive data. Leveraging the unique
quantum properties absent in classical systems, these protocols, as demonstrated in
this study, play a crucial role in controlled publishing of both classical and quantum
information on internet servers. The quantum anonymous publishing of classical information
protocol allows for the dissemination of data without revealing the publisher’s identity,
while the quantum anonymous publishing of quantum information protocol extends
this capability to quantum data. These protocols not only enable secure information
exchange but also incorporate malicious-sensitive strategies to detect and counter potential
malicious activities. As an integral building block for the quantum internet, these
advancements hold the potential to transform future communication and information
exchange methods, reinforcing the necessity for robust quantum anonymous networking
in the ever-evolving landscape of secure digital communication. [Ongoing work : Quantum
Anonymous Publication]
➎ Metaverse:
• Quantum Anonymous Networks (QAN) are essential in the metaverse by ensuring
quantum-resistant security for transactions and interactions. QANs, which use quantum
computing, provide strong encryption and randomization, protecting against manipulation.
The improved processing and simulation efficiency of the quantum anonymous networks
6
Figure 0.4: (Source: [Ongoing work : Anonymous Quantum Identity Authentication in Smart Contracts of
e-Health Systems]) Authentication Phase
can contribute to an overall increase in security and user experience inside the developing
metaverse.
4 Goal:
The main goals of quantum anonymous networks are to enhance secure quantum
communication by developing robust quantum anonymous networking protocols,
implementing quantum entanglement-based anonymous routing for user identity protection,
and exploring quantum-resistant cryptography. Standardization efforts are crucial for
widespread adoption and to establish a trustworthy quantum communication landscape.
➊ Year 1:
• Design quantum entanglement protocols for anonymous communication, enabling untraceable
connections between nodes.
• Simulate and evaluate the Quantum Anonymous Networking model for performance
and security, accounting for environmental factors and potential threats.
• Review quantum communication research for gaps. Build a detailed theoretical framework
for Quantum Anonymous Networking, incorporating insights from existing protocols.
➋ Year 2:
• Optimize quantum algorithms to boost the efficiency and scalability of Quantum Anonymous
Networking for practical real-world applications.
• Transition from simulations to experimental setups to validate proposed protocols,
ensuring practical feasibility.
7
• Analyze security threats in Quantum Anonymous Networking, devise countermeasures
against quantum and classical attacks.
➌ Year 3:
• Integrate Quantum Anonymous Networking with Quantum Key Distribution for enhanced
communication channel security.
• Create user-friendly interfaces for Quantum Anonymous Networking, ensuring accessibility
and ease for secure, anonymous communication.
• Collaborate to gather insights, feedback, and use cases for Quantum Anonymous Networking.
➍ Year 4:
• Standardize Quantum Anonymous Networking protocols, advocating for their adoption
in industry and regulatory frameworks.
• Plan the gradual integration of Quantum Anonymous Networking into existing infrastructures,
addressing deployment challenges and opportunities.
• Optimize Quantum Anonymous Networking for scalability in diverse communication
environments, addressing large-scale network challenges.
➎ Year 5:
• Perform thorough security audits, identify vulnerabilities, and continuously fortify
Quantum Anonymous Networking against emerging threats.
• Explore cutting-edge advancements in quantum communication and cryptography to
enhance the capabilities of Quantum Anonymous Networking. Investigate emerging
quantum technologies and incorporate innovative solutions to stay ahead of potential
threats.
• Establish a dynamic response system to rapidly address and adapt to evolving security
threats. Implement real-time monitoring and analysis to detect and counter emerging
risks to Quantum Anonymous Networking.
References
[1] F. Zaman, S. N. Paing, A. Farooq, H. Shin, and M. Z. Win, “Concealed quantum
telecomputation for anonymous 6g urllc networks.”
[2] M. Christandl and S. Wehner, “Quantum anonymous transmissions,” Chennai, India, Dec.
2005.
[3] W. Yang, L. Huang, and F. Song, “Privacy preserving quantum anonymous transmission via
entanglement relay,” Sci. Rep., vol. 6, no. 1, p. 26762, Jun. 2016.
[4] Y. Wang, X. Li, Y. Han, and K. Zhang, “Practical anonymous entanglement with noisy
measurement,” Quantum Inf. Process., vol. 21, no. 2, p. 49, Feb. 2022.