Cryptographic Protocols under Quantum Attacks
نویسنده
چکیده
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.
منابع مشابه
Quantum Cryptography : Security analyses of multiuser quantum communication with embedded authentication
Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work (Hong et al., 2006, Lee et al., 2005, 2006). The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On ...
متن کاملSome attacks on quantum-based cryptographic protocols
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. As a second example, we...
متن کاملFeasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
Since the introduction of conjugate coding by Wiesner in the 70’s of the last century , quantum cryptography 2,3,4,5,6,7 has developed into an increasingly active area of applied research and technology, as well as a powerful tool to exploit the quantum. From the first realization at IBM’s Yorktown Heights laboratory 5 to its implementation across Lake Geneva 6 and various other spots around th...
متن کاملAttacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with large computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a se...
متن کاملar X iv : 1 10 8 . 63 13 v 1 [ qu an t - ph ] 3 1 A ug 2 01 1 Superposition Attacks on Cryptographic Protocols
Abstract. Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information. In this paper, we introduce a fundamentally new model of quantum attacks on c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1102.0885 شماره
صفحات -
تاریخ انتشار 2011