Double C-NOT attack on a single-state semi-quantum key distribution
protocol and its improvement
- URL: http://arxiv.org/abs/2009.12535v1
- Date: Sat, 26 Sep 2020 08:29:26 GMT
- Title: Double C-NOT attack on a single-state semi-quantum key distribution
protocol and its improvement
- Authors: Jun Gu, Tzonelih Hwang
- Abstract summary: An eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants.
This study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants.
- Score: 0.20767168898581634
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Recently, Zhang et al. proposed a single-state semi-quantum key distribution
protocol (Int. J. Quantum Inf, 18, 4, 2020) to help a quantum participant to
share a secret key with a classical participant. However, this study shows that
an eavesdropper can use a double C-NOT attack to obtain parts of the final
shared key without being detected by the participants. To avoid this problem, a
modification is proposed here.
Related papers
- Efficient source-independent quantum conference key agreement [25.617190829449893]
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants.
We propose a source-independent QCKA scheme utilizing the post-matching method.
We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof.
arXiv Detail & Related papers (2024-06-25T04:24:06Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Tight finite-key analysis for mode-pairing quantum key distribution [21.81489337632085]
We analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks.
We propose a six-state MP-QKD protocol and analyze its finite-key effect.
arXiv Detail & Related papers (2023-02-27T02:35:52Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Semiquantum secret sharing by using x-type states [4.397981844057195]
A semiquantum secret sharing protocol based on x-type states is proposed.
It can accomplish the goal that only when two classical communicants cooperate together can they extract the shared secret key of a quantum communicant.
Detailed security analysis turns out that this protocol is completely robust against an eavesdropper.
arXiv Detail & Related papers (2022-08-03T08:58:45Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - On the lightweight authenticated semi-quantum key distribution protocol
without Trojan horse attack [0.20767168898581634]
We propose a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant.
An attacker can use a modification attack to make both participants share a wrong key without being detected.
arXiv Detail & Related papers (2020-10-20T12:58:47Z) - Two attacks and counterattacks on the mutual semi-quantum key agreement
protocol using Bell states [0.20767168898581634]
The proposed protocol tries to help a quantum participant share a key with a classical participant who just has limited quantum capacities.
This study points out that the classical participant can manipulate the final shared key by himself/herself without being detected.
arXiv Detail & Related papers (2020-10-07T07:44:50Z) - Permutation attack and counterattack on the two-party quantum key
agreement over a collective noisy channel [0.20767168898581634]
This study shows that the participant who announces the permutation operation can manipulate the final shared key by himself/herself without being detected by the other.
To avoid this loophole, an improvement is proposed here.
arXiv Detail & Related papers (2020-09-15T05:27:39Z) - Mediated Asymmetric Semi-Quantum Key Distribution [16.180868868280086]
Two classical participants, who have only limited asymmetric quantum capabilities, can share a secret key with each other.
The proposed protocol is shown to be immune to several well-known attacks.
arXiv Detail & Related papers (2020-09-14T09:22:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.