| Literature DB >> 32679823 |
Vankamamidi S Naresh1, Moustafa M Nasralla2, Sivaranjani Reddi3, Iván García-Magariño4,5.
Abstract
Multi-Agent Systems can support e-Healthcare applications for improving quality of life of citizens. In this direction, we propose a healthcare system architecture named smart healthcare city. First, we divide a given city into various zones and then we propose a zonal level three-layered system architecture. Further, for effectiveness we introduce a Multi-Agent System (MAS) in this three-layered architecture. Protecting sensitive health information of citizens is a major security concern. Group key agreement (GKA) is the corner stone for securely sharing the healthcare data among the healthcare stakeholders of the city. For establishing GKA, many efficient cryptosystems are available in the classical field. However, they are yet dependent on the supposition that some computational problems are infeasible. In light of quantum mechanics, a new field emerges to share a secret key among two or more members. The unbreakable and highly secure features of key agreement based on fundamental laws of physics allow us to propose a Quantum GKA (QGKA) technique based on renowned Quantum Diffie-Hellman (QDH). In this, a node acts as a Group Controller (GC) and forms 2-party groups with remaining nodes, establishing a QDH-style shared key per each two-party. It then joins these keys into a single group key by means of a XOR-operation, acting as a usual group node. Furthermore, we extend the QGKA to Dynamic QGKA (DQGKA) by adding join and leave protocol. Our protocol performance was compared with existing QGKA protocols in terms of Qubit efficiency (QE), unitary operation (UO), unitary operation efficiency (UOE), key consistency check (KCC), security against participants attack (SAP) and satisfactory results were obtained. The security analysis of the proposed technique is based on unconditional security of QDH. Moreover, it is secured against internal and external attack. In this way, e-healthcare Multi-Agent System can be robust against future quantum-based attacks.Entities:
Keywords: multi-agent system; participant attacks; quantum group key; quantum information; quantum summation; quantum teleportation; sensor
Mesh:
Year: 2020 PMID: 32679823 PMCID: PMC7412309 DOI: 10.3390/s20143940
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
List of acronyms of key concepts used in this article.
| Notation | Description |
|---|---|
| QKD | Quantum key distribution |
| QKA | Quantum key agreement |
| MQKA | Multi-party QKA |
| QGKA | Quantum group key agreement protocol |
| DQGKA | dynamic quantum group key agreement protocol |
| MAS NJGK | Multi agent systems New join group key |
| NLGK | New leave group key |
| GC | Group controller |
| PGK | Previous group key |
|
| Number of bits exchanges between the nodes |
Figure 1Outline of quantum two-party key-generation protocol.
Figure 2Two-party quantum key agreement algorithm.
Figure 3Zone level healthcare system architecture.
Figure 4Smart city healthcare architecture.
Figure 5Multiagent architecture of smart city healthcare system in a zone.
DQGKA computation and communication cost.
| Protocol | Communication | Computation | |||
|---|---|---|---|---|---|
| DQGKA | Rounds | Messages | Unicast | Broadcast | XOR Operation |
| Initialize | 2 | 0 | 2 | ||
| Join | 1 | 2 | 1 | 1 | 4 |
| Leave | 1 | 0 | 3 | ||
Intercept and resend attack.
| Quantum Key Transmission between User A, E and B | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| User-A random bits | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 |
| Random sending bases | X | X | + | + | + | X | X | + | X | X |
| Photons user-A sends | ↘ | ↘ | → | → | ↑ |
| ↘ |
|
|
|
| E’s measuring basis | X | X | + | X | + | X | + | + | + | X |
| Polarization Eve measures and communicate | ↘ | ↘ | → | ↘ | → |
| ↘ |
|
|
|
| B’s measuring basis | ↘ | ↘ | ↘ | → | → |
| ↘ | → | ↘ | ↘ |
| Random received bases | X | X | X | + | + | X | + | X | + | X |
|
| ||||||||||
| User-A says which bases were correct | √ | √ | √ | √ | √ | |||||
|
| ||||||||||
| Shared key between user-A and B | 1 | 1 | 1 | 0 | 1 | |||||
Basis used +0: ; +1: ; X0: ; X1:
Shared key calculated by all the other group users except GC.
| Quantum Key Transmission between User-i and GC | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| User-i random bits | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 |
| Random sending bases |
|
|
|
|
|
|
|
|
|
|
| Photons user-i sends |
|
|
|
|
|
|
|
|
|
|
| Random received bases |
|
|
|
|
|
|
|
|
|
|
| Bits GC has received | 1 | 1 | 1 | 0 | 1 | 0 | 1 | 1 | 0 | 1 |
|
| ||||||||||
| GC reports the bases of received bits |
|
|
|
|
|
|
|
|
|
|
| Photons GC measured |
|
|
|
|
|
|
|
|
|
|
| User-i says which bases were correct |
|
|
|
| ||||||
|
| ||||||||||
| Shared key between user-i and GC | 1 | 1 | 0 | 1 | ||||||
Basis used: +0: ; +1: ; X0: ; X1:
Key component established by GC for the respective members.
| User | Key Index |
Individual Members-Two Party Keys Established with GC | Two Party Keys after Length Adjustment | Partial Key Components Established by GC for the Respective Members |
|---|---|---|---|---|
| User-2 |
| 1101 | 1101 |
|
| User-3 |
| 101 | 0101 |
|
| User-4 |
| 0100 | 0100 |
|
| User-5 |
| 1111 | 1111 |
|
Computation of final group key by all the users of e-healthcare.
| User Number |
Partial Key Component sent by GC |
Individual Two-Party Keys Established with GC |
Final GROUP KEY |
|---|---|---|---|
| User-2 | 0101 | 1101 | 1000 |
| User-3 | 1101 | 0101 | 1000 |
| User-4 | 1100 | 0100 | 1000 |
| User-5 | 0111 | 1111 | 1000 |
Qiskit functions.
| Function Name | Description |
|---|---|
| Quantum Register (n, name=‘qr’) | Used to store one qubit bit |
| Classical Register (n, name=‘cr’) | For storing the output of the measurement |
| Quantum Circuit (qr, cr, name=‘Alice’) | Collections of quantum gates interconnected by quantum wires |
| np.random.randint (0, high=2n) | Generate a random number between 0 to 2n |
| np.binary_repr (alice_key, n) | Returns the binary equivalent of the given number n as a string |
| BasicAer.get_backend (‘qasm_simulator’) | Simulates the circuit in the backend |
| execute (bob, backend = backend, shots = 1).result() | Executes the circuit created using qsam simulator in the backend |
Figure 6Key-generation time among multi-agents/stake holders.
Figure 7Time for qubit generation by GC.
Figure 8Time for shared key finalization with individual user through public discussion.
Figure 9User partial key generation time by the GC.
Figure 10Time complexity of various operations for secure data processing in e-healthcare multi-agent system.
Comparative analysis of multiparty QKA (MQKA) protocols.
| MQKA Protocol | QE | UO | UOE | SAP | KCC | Entanglement Required |
|---|---|---|---|---|---|---|
| LGMHW [ |
| no | 0 | secure | no | no |
| HSXLFJY [ |
| yes |
| secure | no | no |
| WSH [ |
| yes |
| secure | no | no |
| SYW [ |
| yes |
| insecure | no | yes |
| SZWYZL [ |
| yes |
| insecure | no | yes |
| CM [ |
| yes |
| secure | no | yes |
| HUA [ |
| yes |
| secure | yes | no |
| Proposed |
| yes |
| secure | yes | yes |
N = number of participants.