On the lightweight authenticated semi-quantum key distribution protocol
without Trojan horse attack
- URL: http://arxiv.org/abs/2010.10236v1
- Date: Tue, 20 Oct 2020 12:58:47 GMT
- Title: On the lightweight authenticated semi-quantum key distribution protocol
without Trojan horse attack
- Authors: Jun Gu and Tzonelih Hwang
- Abstract summary: We propose a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant.
An attacker can use a modification attack to make both participants share a wrong key without being detected.
- Score: 0.20767168898581634
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a
lightweight authenticated semi-quantum key distribution protocol for a quantum
participant to share a secret key with a classical participant. However, this
study points out that an attacker can use a modification attack to make both
participants share a wrong key without being detected. To avoid this problem,
an improvement is proposed here.
Related papers
- Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Tight finite-key analysis for mode-pairing quantum key distribution [21.81489337632085]
We analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks.
We propose a six-state MP-QKD protocol and analyze its finite-key effect.
arXiv Detail & Related papers (2023-02-27T02:35:52Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Certified Robustness of Quantum Classifiers against Adversarial Examples
through Quantum Noise [68.1992787416233]
We show that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks.
We derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples.
arXiv Detail & Related papers (2022-11-02T05:17:04Z) - Improved Semi-Quantum Key Distribution with Two Almost-Classical Users [1.827510863075184]
We revisit a mediated semi-quantum key distribution protocol introduced by Massa et al.
We show how this protocol may be extended to improve its efficiency and also its noise tolerance.
We evaluate the protocol's performance in a variety of lossy and noisy channels.
arXiv Detail & Related papers (2022-03-20T14:41:14Z) - Two attacks and counterattacks on the mutual semi-quantum key agreement
protocol using Bell states [0.20767168898581634]
The proposed protocol tries to help a quantum participant share a key with a classical participant who just has limited quantum capacities.
This study points out that the classical participant can manipulate the final shared key by himself/herself without being detected.
arXiv Detail & Related papers (2020-10-07T07:44:50Z) - Double C-NOT attack on a single-state semi-quantum key distribution
protocol and its improvement [0.20767168898581634]
An eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants.
This study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants.
arXiv Detail & Related papers (2020-09-26T08:29:26Z) - Permutation attack and counterattack on the two-party quantum key
agreement over a collective noisy channel [0.20767168898581634]
This study shows that the participant who announces the permutation operation can manipulate the final shared key by himself/herself without being detected by the other.
To avoid this loophole, an improvement is proposed here.
arXiv Detail & Related papers (2020-09-15T05:27:39Z) - Mediated Asymmetric Semi-Quantum Key Distribution [16.180868868280086]
Two classical participants, who have only limited asymmetric quantum capabilities, can share a secret key with each other.
The proposed protocol is shown to be immune to several well-known attacks.
arXiv Detail & Related papers (2020-09-14T09:22:45Z) - Tight finite-key analysis for generalized high-dimensional quantum key
distribution [23.578892457164933]
We propose a tight finite-key analysis suitable for generalized high-dimensional quantum key distribution protocols.
Benefitting from our theory, high-dimensional quantum key distribution protocols with finite resources become experimentally feasible.
arXiv Detail & Related papers (2020-08-08T12:33:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.