Remote quantum-safe authentication of entities with physical unclonable
functions
- URL: http://arxiv.org/abs/2108.00468v1
- Date: Sun, 1 Aug 2021 15:03:23 GMT
- Title: Remote quantum-safe authentication of entities with physical unclonable
functions
- Authors: Georgios M. Nikolopoulos
- Abstract summary: We discuss the requirements that an entity authentication protocol has to offer in order to be useful for remote entity authentication in practice.
We propose a protocol, which can operate over large distances, and offers security against both classical and quantum adversaries.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Physical unclonable functions have been shown a useful resource of randomness
for implementing various cryptographic tasks including entity authentication.
All of the related entity authentication protocols that have been discussed in
the literature so far, either they are vulnerable to an emulation attack, or
they are limited to short distances. Hence, quantum-safe remote entity
authentication over large distances remains an open question. In the first part
of this work we discuss the requirements that an entity authentication protocol
has to offer in order to be useful for remote entity authentication in
practice. Subsequently, we propose a protocol, which can operate over large
distances, and offers security against both classical and quantum adversaries.
The proposed protocol relies on standard techniques, it is fully compatible
with the infrastructure of existing and future photonic networks, and it can
operate in parallel with other quantum protocols, including QKD protocols.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - User-Authenticated Device-Independent Quantum Secure Direct Communication Protocol [5.420275467831935]
Device-Independent Quantum Secure Direct Communication (DI-QSDC) enhances quantum cryptography.
We propose the first of its kind DI-QSDC protocol with user identity authentication.
arXiv Detail & Related papers (2024-09-16T16:03:22Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Authenticated Multiparty Quantum Key Agreement for Optical-Ring Quantum
Communication Networks [7.753213765615376]
In the key agreement protocols, an attacker can impersonate a legal user to participate in the negotiation process and eavesdrop the agreement key easily.
This is often overlooked in most quantum key agreement protocols, which makes them insecure in practical implementation.
Considering this problem, the function of authenticating the user's identity is added in the proposed protocol.
arXiv Detail & Related papers (2021-12-15T07:16:09Z) - A short review on quantum identity authentication protocols: How would
Bob know that he is talking with Alice? [0.0]
Successful implementation of a scheme of quantum key distribution (QKD) requires identity authentication as a prerequisite.
Several schemes for identity authentication, using quantum resources have been proposed.
The security of such protocols is also critically analyzed.
arXiv Detail & Related papers (2021-12-08T11:22:29Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Client-Server Identification Protocols with Quantum PUF [1.4174475093445233]
We propose two identification protocols based on the emerging hardware secure solutions, the quantum Physical Unclonable Functions (qPUFs)
The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice-versa.
Unlike existing identification protocols based on Quantum Read-out PUFs which rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties.
arXiv Detail & Related papers (2020-06-08T12:35:09Z) - Twin-field quantum digital signatures [4.503555294002338]
Digital signature is a key technique in information security, especially for identity authentications.
Quantum digital signatures (QDSs) provide a considerably higher level of security, i.e., information-theoretic security.
arXiv Detail & Related papers (2020-03-25T08:04:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.