Repeater Attacks in Quantum Entanglement Networks
Abstract
Quantum entanglement networks represent cutting-edge technologies with critical applications in secure communication. However, their reliance on the unconditional trust of quantum repeaters introduces potential vulnerabilities to third-party attacks. Notably, the Quantum Hijacking Attack and the Quantum Black Hole Attack have gained attention for exploiting this trust-based weakness. This study analyzes the mechanisms behind these attacks, with particular emphasis on the Quantum Black Hole Attack, and highlights the limitations of current tomography-based detection methods in effectively identifying such threats.
Keywords:
Quantum Network, Quantum Security
References
Altepeter, J. B., Jeffrey, E. R., and Kwiat, P. G. (2005). Photonic state tomography. Advances in Atomic, Molecular, and Optical Physics, 52:105–159.
De Andrade, M. G., Diaz, J., Navas, J., Guha, S., Montaño, I., Smith, B., Raymer, M., and Towsley, D. (2022). Quantum network tomography with multi-party state distribution. In 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), pages 400–409. IEEE.
Dijkstra, E. W. (2022). A note on two problems in connexion with graphs. In Edsger Wybe Dijkstra: His Life, Work, and Legacy, pages 287–290.
Guedes de Andrade, M., Navas, J., Guha, S., Montaño, I., Raymer, M., Smith, B., and Towsley, D. (2024). Quantum network tomography. IEEE Network, 38(5):114–122.
Satoh, T., Nagayama, S., Oka, T., and Van Meter, R. (2018). The network impact of hijacking a quantum repeater. Quantum Science and Technology, 3(3):034008.
Satoh, T., Nagayama, S., Suzuki, S., Matsuo, T., Hajdušek, M., and Van Meter, R. (2021). Attacking the quantum internet. IEEE Transactions on Quantum Engineering, 2:1–17.
Suzuki, S. and Van Meter, R. (2015). Classification of quantum repeater attacks. In Proceedings of the NDSS Workshop on Security of Emerging Technologies.
Yuen, H. P. (2016). Security of quantum key distribution. IEEE Access, 4:724–749.
Zangi, S. M., Shukla, C., Ur Rahman, A., and Zheng, B. (2023). Entanglement swapping and swapped entanglement. Entropy, 25(3):415.
De Andrade, M. G., Diaz, J., Navas, J., Guha, S., Montaño, I., Smith, B., Raymer, M., and Towsley, D. (2022). Quantum network tomography with multi-party state distribution. In 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), pages 400–409. IEEE.
Dijkstra, E. W. (2022). A note on two problems in connexion with graphs. In Edsger Wybe Dijkstra: His Life, Work, and Legacy, pages 287–290.
Guedes de Andrade, M., Navas, J., Guha, S., Montaño, I., Raymer, M., Smith, B., and Towsley, D. (2024). Quantum network tomography. IEEE Network, 38(5):114–122.
Satoh, T., Nagayama, S., Oka, T., and Van Meter, R. (2018). The network impact of hijacking a quantum repeater. Quantum Science and Technology, 3(3):034008.
Satoh, T., Nagayama, S., Suzuki, S., Matsuo, T., Hajdušek, M., and Van Meter, R. (2021). Attacking the quantum internet. IEEE Transactions on Quantum Engineering, 2:1–17.
Suzuki, S. and Van Meter, R. (2015). Classification of quantum repeater attacks. In Proceedings of the NDSS Workshop on Security of Emerging Technologies.
Yuen, H. P. (2016). Security of quantum key distribution. IEEE Access, 4:724–749.
Zangi, S. M., Shukla, C., Ur Rahman, A., and Zheng, B. (2023). Entanglement swapping and swapped entanglement. Entropy, 25(3):415.
Published
2025-05-19
How to Cite
SMITH, Arthur; ABREU, Diego; ABELÉM, Antônio.
Repeater Attacks in Quantum Entanglement Networks. In: QUANTUM NETWORKS WORKSHOP (WQUNETS), 2. , 2025, Natal/RN.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2025
.
p. 13-18.
DOI: https://doi.org/10.5753/wqunets.2025.8770.