Unitary operation attack and the improvement on probabilistic quantum key distribution

نویسندگان

  • Tzu-Han Lin
  • Chun-Wei Yang
  • Tzonelih Hwang
چکیده

This study points out that a malicious communicant in Hwang et al.’s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve the problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

متن کامل

Probabilistic unitary quantum channels

Probabilistic unitary maps and probabilistic unitary quantum channels are introduced, many quantum information applications, including (unambiguous) teleportation, can be described as probabilistic unitary quantum channels. Some properties of probabilistic unitary maps and probabilistic unitary quantum channels are derived. The property of a probabilistic unitary quantum channel ensures certain...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Probabilistic Allocation Of Parking lots In Distribution Network Considering Uncertainty.

In this paper, parking lots with bidirectional power flow capability, is used as an achievements of smart power systems. Based on operating conditions, electric vehicles can be considered  as a load  or generator. For optimal operation of power systems, allocation of these novel units is also necessary same as other distributed generation. In this paper, an optimization problem is  proposed for...

متن کامل

Eavesdropping on the Boström-Felbinger Communication Protocol in Noisy Quantum Channel

We show an eavesdropping scheme on Boström-Felbinger communication protocol ( called pingpong protocol ) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice’s information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Quantum Information & Computation

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2014