Improving the Security of "Measurement-Device-Independent Quantum
Communication without Encryption"
- URL: http://arxiv.org/abs/2006.05263v2
- Date: Mon, 1 Feb 2021 15:15:43 GMT
- Title: Improving the Security of "Measurement-Device-Independent Quantum
Communication without Encryption"
- Authors: Nayana Das and Goutam Paul
- Abstract summary: Niu et al. proposed a measurement-device-independent quantum secure direct communication protocol using Einstein-Podolsky-Rosen pairs and generalized it to a quantum dialogue protocol.
By analyzing these protocols we find some security issues in both these protocols.
In this work, we show that both the protocols are not secure against information leakage, and a third party can get half of the secret information without any active attack.
- Score: 3.490038106567192
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Recently in 2018, Niu et al. proposed a measurement-device-independent
quantum secure direct communication protocol using Einstein-Podolsky-Rosen
pairs and generalized it to a quantum dialogue protocol (Niu et al., Science
bulletin 63.20, 2018). By analyzing these protocols we find some security
issues in both these protocols. In this work, we show that both the protocols
are not secure against information leakage, and a third party can get half of
the secret information without any active attack. We also propose suitable
modifications of these protocols to improve the security.
Related papers
- A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Quantum Two-Way Communication Protocol Beyond Superdense Coding [36.25599253958745]
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs.
The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol.
arXiv Detail & Related papers (2023-09-06T08:48:07Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Anonymous communication protocol over quantum networks [5.61186040823947]
We propose a W state-based protocol for anonymously transmitting quantum messages in a quantum network.
We develop three sub-protocols using the W state, including the quantum collision detection protocol and the quantum notification protocol.
arXiv Detail & Related papers (2021-07-17T02:51:15Z) - Secure Multi-Party Quantum Conference and Xor Computation [3.490038106567192]
A Measurement Device Independent Quantum Dialogue protocol has been proposed (Quantum Information Processing 16.12: 305) in 2017.
We first generalize this protocol to a three-party quantum conference and then to a multi-party quantum conference.
We also propose a protocol for quantum multi-party XOR computation.
arXiv Detail & Related papers (2021-01-14T12:03:08Z) - Cryptanalysis of Quantum Secure Direct Communication Protocol with
Mutual Authentication Based on Single Photons and Bell States [3.490038106567192]
We show that the QSDC protocol is not secure against intercept-and-resend attack and impersonation attack.
We propose a modification of this protocol, which defeats the above attacks along with all the familiar attacks.
arXiv Detail & Related papers (2020-07-07T18:02:38Z) - Quantum direct communication protocols using discrete-time quantum walk [1.9551668880584971]
We propose two quan-tum direct communication protocols, a Quantum Secure Direct Communication (QSDC) protocoland a Controlled Quantum Dialogue (CQD) protocol using discrete-time quantum walk on a cycle.
The proposed protocols are unconditionally secure against various attacks such as the intercept-resend attack, the denial of service attack, and the man-in-the-middle attack.
arXiv Detail & Related papers (2020-04-07T11:16:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.