Concerning Quantum Identification Without Entanglement
- URL: http://arxiv.org/abs/2003.12095v2
- Date: Mon, 30 Mar 2020 14:29:45 GMT
- Title: Concerning Quantum Identification Without Entanglement
- Authors: Carlos E. Gonz\'alez-Guill\'en, Mar\'ia Isabel Gonz\'alez Vasco, Floyd
Johnson, \'Angel L. P\'erez del Pozo
- Abstract summary: We comment on a recent proposal for quantum identity authentication from Zawadzki.
We show that using a simple strategyan adversary may indeed obtain non-negligible information on the shared identification secret.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Identification schemes are interactive protocols typically involving two
parties, a prover, who wants to provide evidence of his or her identity and a
verifier, who checks the provided evidence and decide whether it comes or not
from the intended prover. In this paper, we comment on a recent proposal for
quantum identity authentication from Zawadzki, and give a concrete attack
upholding theoretical impossibility results from Lo and Buhrman et al. More
precisely, we show that using a simple strategyan adversary may indeed obtain
non-negligible information on the shared identification secret. While the
security of a quantum identity authentication scheme is not formally defined in
[1], it is clear that such a definition should somehow imply that an external
entity may gain no information on the shared identification scheme (even if he
actively participates injecting messages in a protocol execution, which is not
assumed in our attack strategy).
Related papers
- Impossibility of Quantum Private Queries [0.0]
Symmetric private information retrieval is a cryptographic task allowing a user to query a database and obtain exactly one entry without revealing to the owner of the database which element was accessed.
We give an explicit attack against any cheat-sensitive symmetric private information retrieval protocol, showing that any protocol that is secure for the user cannot have non-trivial security guarantees for the owner of the database.
arXiv Detail & Related papers (2025-01-22T12:42:28Z) - Secure quantum bit commitment from separable operations [0.0]
We show that imposing a restriction on the committing party to perform only separable operations enables secure quantum bit commitment schemes.
Specifically, we prove that in any perfectly hiding bit commitment protocol, an honestly-committing party limited to separable operations will be detected with high probability if they attempt to alter their commitment.
arXiv Detail & Related papers (2025-01-13T14:15:11Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Simultaneous quantum identity authentication scheme utilizing entanglement swapping with secret key preservation [0.0]
We introduce a new protocol for quantum identity authentication (QIA)
Our proposed scheme facilitates simultaneous authentication between two users, Alice and Bob, leveraging Bell states with the assistance of a third party, Charlie.
We demonstrate that the proposed protocol withstands various known attacks, including impersonation, intercept and resend and impersonated fraudulent attacks.
arXiv Detail & Related papers (2024-05-23T18:40:15Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Experimental relativistic zero-knowledge proofs [4.334542470441071]
We develop a zero-knowledge protocol involving two separated verifier-prover pairs.
Security is enforced via the physical principle of special relativity.
This demonstrates the practical potential of multi-prover zero-knowledge protocols.
arXiv Detail & Related papers (2020-12-18T19:00:01Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Taking Modality-free Human Identification as Zero-shot Learning [46.51413603352702]
We develop a novel Modality-Free Human Identification (named MFHI) task as a generic zero-shot learning model in a scalable way.
It is capable of bridging the visual and semantic modalities by learning a discriminative prototype of each identity.
In addition, the semantics-guided spatial attention is enforced on visual modality to obtain representations with both high global category-level and local attribute-level discrimination.
arXiv Detail & Related papers (2020-10-02T13:08:27Z) - Quantum-secure message authentication via blind-unforgeability [74.7729810207187]
We propose a natural definition of unforgeability against quantum adversaries called blind unforgeability.
This notion defines a function to be predictable if there exists an adversary who can use "partially blinded" access to predict values.
We show the suitability of blind unforgeability for supporting canonical constructions and reductions.
arXiv Detail & Related papers (2018-03-10T05:31:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.