quantum authentication
Recently Published Documents


TOTAL DOCUMENTS

51
(FIVE YEARS 9)

H-INDEX

8
(FIVE YEARS 2)

2021 ◽  
Vol 75 (10) ◽  
Author(s):  
B. Lari ◽  
M. Hossientabar ◽  
H. Hassanabadi

Entropy ◽  
2021 ◽  
Vol 23 (4) ◽  
pp. 389
Author(s):  
Carlos E. González-Guillén ◽  
María Isabel González Vasco ◽  
Floyd Johnson ◽  
Ángel L. Pérez del Pozo

Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts.


Cryptography ◽  
2019 ◽  
Vol 3 (4) ◽  
pp. 25 ◽  
Author(s):  
Lukas Fladung ◽  
Georgios M. Nikolopoulos ◽  
Gernot Alber ◽  
Marc Fischlin

Optical physical unclonable keys are currently considered to be rather promising candidates for the development of entity authentication protocols, which offer security against both classical and quantum adversaries. In this work, we investigate the robustness of a continuous-variable protocol, which relies on the scattering of coherent states of light from the key, against three different types of intercept–resend emulation attacks. The performance of the protocol is analyzed for a broad range of physical parameters, and our results are compared to existing security bounds.


2019 ◽  
Vol 19 (11&12) ◽  
pp. 913-934
Author(s):  
Daan Leermakers ◽  
Boris Skoric

Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. QKR protocols can achieve better round complexity than Quantum Key Distribution. We consider a QKR protocol that works with qubits, as opposed to high-dimensional qudits. A security proof was given by Fehr and Salvail in the case where there is practically no noise. A high-rate scheme for the noisy case was proposed by \v{S}kori\'{c} and de Vries, based on eight-state encoding. However, a security proof was not given. In this paper we introduce a protocol modification and provide a security proof. The modified protocol has high rate not only for 8-state encoding, but also 6-state and BB84 encoding. Our proof is based on a bound on the trace distance between the real quantum state of the system and a state in which the keys are completely secure. It turns out that the rate is higher than suggested by previous results. Asymptotically the rate equals the rate of Quantum Key Distribution with one-way postprocessing.


2019 ◽  
Vol 16 (7) ◽  
pp. 075206 ◽  
Author(s):  
Xiao-Jun Wen ◽  
Xing-Qiang Zhao ◽  
Li-Hua Gong ◽  
Nan-Run Zhou

Sign in / Sign up

Export Citation Format

Share Document