Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement
نویسندگان
چکیده
Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol to help quantum participant share secret with classical participant. However, this study shows that an eavesdropper can use double C-NOT attack obtain parts of the final shared without being detected by participants. To avoid problem, modification is here.
منابع مشابه
A New and Feasible Protocol for Semi-quantum Key Distribution
Quantum Key Distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semi-quantum Key Distribution (SQKD) protocols, such as “QKD with classical Bob” and “QKD with classical Alice” (that have both been proven robust), achieve this goal even if one of the parties is classical. However, the currently existing SQKD protocols are not experimentally feas...
متن کاملSemi-Quantum Key Distribution
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob...
متن کاملUnitary operation attack and the improvement on probabilistic quantum key distribution
This study points out that a malicious communicant in Hwang et al.’s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve ...
متن کاملSequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol
In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al.[5]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposit...
متن کاملDecoy state quantum key distribution.
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11162522