Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement

نویسندگان

چکیده

Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol to help quantum participant share secret with classical participant. However, this study shows that an eavesdropper can use double C-NOT attack obtain parts of the final shared without being detected by participants. To avoid problem, modification is here.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New and Feasible Protocol for Semi-quantum Key Distribution

Quantum Key Distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semi-quantum Key Distribution (SQKD) protocols, such as “QKD with classical Bob” and “QKD with classical Alice” (that have both been proven robust), achieve this goal even if one of the parties is classical. However, the currently existing SQKD protocols are not experimentally feas...

متن کامل

Semi-Quantum Key Distribution

Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob...

متن کامل

Unitary operation attack and the improvement on probabilistic quantum key distribution

This study points out that a malicious communicant in Hwang et al.’s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve ...

متن کامل

Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al.[5]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposit...

متن کامل

Decoy state quantum key distribution.

There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11162522