scholarly journals An Attack on Zawadzki’s Quantum Authentication Scheme

Entropy ◽  
2021 ◽  
Vol 23 (4) ◽  
pp. 389
Author(s):  
Carlos E. González-Guillén ◽  
María Isabel González Vasco ◽  
Floyd Johnson ◽  
Ángel L. Pérez del Pozo

Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts.

2019 ◽  
Vol 59 (1) ◽  
pp. 236-249
Author(s):  
Shun Zhang ◽  
Zhang-Kai Chen ◽  
Run-Hua Shi ◽  
Feng-Yu Liang

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 518 ◽  
Author(s):  
Bin Liu ◽  
Zhifeng Gao ◽  
Di Xiao ◽  
Wei Huang ◽  
Zhiqing Zhang ◽  
...  

In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.


2011 ◽  
Vol 09 (02) ◽  
pp. 701-721 ◽  
Author(s):  
PENG HUANG ◽  
JUN ZHU ◽  
YUAN LU ◽  
GUI-HUA ZENG

Two continuous-variable quantum identity authentication schemes, which are utilized to prevent active attack, are presented by using Gaussian-modulated squeezed states. The proposed schemes can both verify user's identity as well as distribute an updated new key as the authentication key. A new defined fidelity parameter is proposed to verify the identity of the communicator and detect eavesdropping. The analytical results show the feasibility of these two identity authentication schemes and the security under the attack of general Gaussian-cloner strategy and collective attack.


Sign in / Sign up

Export Citation Format

Share Document