Cryptoanalysis of a key exchange protocol based on a congruence-simple semiring action
- URL: http://arxiv.org/abs/2402.09480v1
- Date: Tue, 13 Feb 2024 13:13:58 GMT
- Title: Cryptoanalysis of a key exchange protocol based on a congruence-simple semiring action
- Authors: Otero Sanchez Alvaro, Lopez Ramos Juan Antonio,
- Abstract summary: We show that a previously introduced key exchange based on a congruence-simple semiring action is not secure by providing an attack that reveals the shared key from the distributed public information for any of such semirings.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We show that a previously introduced key exchange based on a congruence-simple semiring action is not secure by providing an attack that reveals the shared key from the distributed public information for any of such semirings
Related papers
- Key exchange protocol based on circulant matrix action over congruence-simple semiring [0.0]
We present a new key exchange protocol based on circulant matrices acting on matrices over a congruence-simple semiring.
We provide an analysis of its computational cost and its security against known attacks.
arXiv Detail & Related papers (2025-05-01T17:07:11Z) - Cryptoanalysis of a public key exchange based on circulant matrix over digital semiring [0.0]
We present a cryptanalysis of a key exchange protocol based on the digital semiring.
We find the maximal solution of a linear system over such semiring, and use the properties of circulant matrix to demonstrate that the protocol is vulnerable.
arXiv Detail & Related papers (2025-04-22T13:25:29Z) - A generalization of Burmester-Desmedt GKE based on a non-abelian finite group action [0.0]
We propose a generalization of the well known group key exchange protocol.
We prove that the presented protocol is secure in Katz and Yung's model.
arXiv Detail & Related papers (2024-11-30T07:45:06Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a novel quantum digital signature protocol without a trusted third-party.
We prove that the protocol has information-theoretical unforgeability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Crypto analysis of the key distribution scheme using noise-free resistances [0.0]
Key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement.
A crypto analysis of an interesting hardware key distribution scheme is presented.
It is shown that, if Eve gains access to the initial shared secret at any time in the past or future, she can successfully crack all the generated keys in the past and future.
arXiv Detail & Related papers (2023-11-19T00:53:08Z) - Public Key Encryption with Secure Key Leasing [24.410596031297242]
We introduce the notion of public key encryption with secure key leasing (PKE-SKL)
Our notion is similar in spirit to the notion of secure software leasing (SSL) introduced by Ananth and La Placa (Eurocrypt 2021)
In more detail, our adversary is not restricted to use an honest evaluation algorithm to run pirated software.
arXiv Detail & Related papers (2023-02-22T21:37:57Z) - Security of quantum key distribution from generalised entropy
accumulation [2.1030878979833467]
We provide a formal framework for general quantum key distribution protocols.
We show that security against general attacks reduces to security against collective attacks.
Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation.
arXiv Detail & Related papers (2022-03-09T19:00:07Z) - Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast
Channels [37.90858441567178]
Secret-sharing building blocks based on quantum broadcast communication are studied.
The confidential capacity region of the pure-loss bosonic broadcast channel is determined.
We derive an achievable layered-secrecy region for a pure-loss bosonic channel formed by the concatenation of two beam splitters.
arXiv Detail & Related papers (2021-05-09T21:58:17Z) - On the lightweight authenticated semi-quantum key distribution protocol
without Trojan horse attack [0.20767168898581634]
We propose a lightweight authenticated semi-quantum key distribution protocol for a quantum participant to share a secret key with a classical participant.
An attacker can use a modification attack to make both participants share a wrong key without being detected.
arXiv Detail & Related papers (2020-10-20T12:58:47Z) - Tight finite-key analysis for generalized high-dimensional quantum key
distribution [23.578892457164933]
We propose a tight finite-key analysis suitable for generalized high-dimensional quantum key distribution protocols.
Benefitting from our theory, high-dimensional quantum key distribution protocols with finite resources become experimentally feasible.
arXiv Detail & Related papers (2020-08-08T12:33:53Z) - A verifiable quantum key agreement protocol based on six-qubit cluster
states [14.148375496762261]
A verifiable distributor who preserves some subsequences of the six-qubit cluster states is introduced into this protocol.
The correctness and simultaneity of the shared key are guaranteed by the trusted design combiner and homomorphic hash function.
arXiv Detail & Related papers (2020-06-23T04:04:14Z) - Secure multiparty quantum key agreement against collusive attacks [0.0]
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs.
In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants.
In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone.
arXiv Detail & Related papers (2020-04-24T13:27:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.