Security Proof Against Collective Attacks for an Experimentally Feasible
Semiquantum Key Distribution Protocol
- URL: http://arxiv.org/abs/2012.02127v4
- Date: Mon, 3 Jul 2023 17:59:33 GMT
- Title: Security Proof Against Collective Attacks for an Experimentally Feasible
Semiquantum Key Distribution Protocol
- Authors: Walter O. Krawec, Rotem Liss, Tal Mor
- Abstract summary: Semiquantum key distribution (SQKD) allows two parties to create a shared secret key, even if one of these parties is classical.
Most SQKD protocols suffer from severe practical security problems when implemented using photons.
"Mirror protocol" is an experimentally feasible SQKD protocol overcoming those drawbacks.
- Score: 1.5469452301122175
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to
create a shared secret key, even if one of these parties (say, Alice) is
classical. However, most SQKD protocols suffer from severe practical security
problems when implemented using photons. The recently developed "Mirror
protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an
experimentally feasible SQKD protocol overcoming those drawbacks. The Mirror
protocol was proven robust (namely, it was proven secure against a limited
class of attacks including all noiseless attacks), but its security in case
some noise is allowed (natural or due to eavesdropping) has not been proved
yet. Here we prove security of the Mirror protocol against a wide class of
quantum attacks (the "collective attacks"), and we evaluate the allowed noise
threshold and the resulting key rate.
Related papers
- Tight finite-key analysis for mode-pairing quantum key distribution [21.81489337632085]
We analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks.
We propose a six-state MP-QKD protocol and analyze its finite-key effect.
arXiv Detail & Related papers (2023-02-27T02:35:52Z) - Security of differential phase shift QKD from relativistic principles [1.114274092885218]
This work presents the first full security proof of DPS QKD against general attacks.
The proof combines techniques from quantum information theory, quantum optics, and relativity.
Our results shed light on the range of applicability of state-of-the-art security proof techniques.
arXiv Detail & Related papers (2023-01-26T19:00:00Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - A novel two-party semiquantum key distribution protocol based on
GHZ-like states [0.0]
The proposed SQKD protocol can create a private key shared between one quantum party with unlimited quantum abilities and one classical party with limited quantum abilities without the existence of a third party.
Detailed security analysis turns out that the proposed SQKD protocol can resist various famous attacks from an outside eavesdropper.
arXiv Detail & Related papers (2022-04-21T13:25:53Z) - Beyond quadratic speedups in quantum attacks on symmetric schemes [30.01567358439495]
We report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only.
Our attack shows that the structure of some symmetric constructions can be exploited to overcome this limit.
arXiv Detail & Related papers (2021-10-06T15:10:31Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Cryptanalysis of Quantum Secure Direct Communication Protocol with
Mutual Authentication Based on Single Photons and Bell States [3.490038106567192]
We show that the QSDC protocol is not secure against intercept-and-resend attack and impersonation attack.
We propose a modification of this protocol, which defeats the above attacks along with all the familiar attacks.
arXiv Detail & Related papers (2020-07-07T18:02:38Z) - Dispelling Myths on Superposition Attacks: Formal Security Model and
Attack Analyses [0.0]
We propose the first computational security model considering superposition attacks for multiparty protocols.
We show that our new security model is satisfiable by proving the security of the well-known One-Time-Pad protocol.
We use this newly imparted knowledge to construct the first concrete protocol for Secure Two-Party Computation that is resistant to superposition attacks.
arXiv Detail & Related papers (2020-07-01T18:00:54Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.