An Attack Strategy based on Hyperbolic Coordinates

Author(s):  
Hong Yu ◽  
Jiahao Liu ◽  
Zuxi Wang
Keyword(s):  
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


1994 ◽  
Vol 24 (6) ◽  
pp. 1253-1259 ◽  
Author(s):  
Romain Mees ◽  
David Strauss ◽  
Richard Chase

We describe a model that estimates the optimal total expected cost of a wildland fire, given uncertainty in both flame length and fire-line width produced. In the model, a sequence of possible fire-line perimeters is specified, each with a forecasted control time. For a given control time and fire line, the probability of containment of the fire is determined as a function of the fire-fighting resources available. Our procedure assigns the resources to the fire line so as to minimize the total expected cost. A key feature of the model is that the probabilities reflect the degree of uncertainty in (i) the width of fire line that can be built with a given resource allocation, and (ii) the flame length of the fire. The total expected cost associated with a given choice of fire line is the sum of: the loss or gain of value of the area already burned; the cost of the resources used in the attack; and the expected loss or gain of value beyond the fire line. The latter is the product of the probability that the chosen attack strategy fails to contain the fire and the value of the additional burned area that would result from such a failure. The model allows comparison of the costs of the different choices of fire line, and thus identification of the optimal strategy. A small case study is used to illustrate the procedure.


2021 ◽  
Vol 2056 (1) ◽  
pp. 012011
Author(s):  
Chan Myae Hein ◽  
T F Kamalov

Abstract A new eavesdropping strategy is proposed for the Quantum Key Distribution (QKD) protocol. This scheme represents a new kind of intercept/resend strategy based on Bell’s theorem. Quantum key distribution (QKD) provides the foremost reliable form of secure key exchange, using only the input-output statistics of the devices to realize information-theoretic security. In this paper, we present an improved QKD protocol that can simultaneously distribute the quantum secret key. We are already using the QKD protocol with simulated results matched completely with the theoretical concepts.


Author(s):  
Hengdao Guo ◽  
Herbert Ho-Ching Iu ◽  
Tyrone Fernando ◽  
Ciyan Zheng ◽  
Xi Zhang ◽  
...  

2021 ◽  
pp. 1154-1159
Author(s):  
Lingling Xia ◽  
Xueli Ni ◽  
Zhengjun Jing ◽  
Jiayin Liu ◽  
Yan Zhang

Sign in / Sign up

Export Citation Format

Share Document