Restricted attacks on semi-quantum key distribution protocols
نویسنده
چکیده
In this paper, we investigate single state, semi-quantum key distribution protocols. These are protocols whereby one party is limited to measuring only in the computational basis, while the other, though capable of measuring in both computational and Hadamard bases, is limited to preparing and sending only a single, publicly known qubit state. Such protocols rely necessarily on a two-way quantum communication channel making their security analysis difficult. However we will show that, for single state protocols, we need only consider a restricted attack operation by Eve. We will also describe a new single state protocol which permits “reflections” to carry information and use our results concerning restricted attacks to show its robustness.
منابع مشابه
Detection loophole attacks on semi-device-independent quantum and classical protocols
Semi-device-independent quantum protocols realize information tasks – e.g. secure key distribution, random access coding, and randomness generation – in a scenario where no assumption on the internal working of the devices used in the protocol is made, except their dimension. These protocols offer two main advantages: first, their implementation is often less demanding than fully-device-indepen...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملQuantum Cryptography : Security analyses of multiuser quantum communication with embedded authentication
Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work (Hong et al., 2006, Lee et al., 2005, 2006). The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On ...
متن کاملSemi-Quantum Key Distribution
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob...
متن کاملSecurity of quantum key distribution with entangled photons against individual attacks
We investigate the security of quantum key distribution with entangled photons, focusing on the two-photon variation of the Bennett-Brassard 1984 ~BB84! protocol proposed in 1992 by Bennett, Brasard, and Mermin ~BBM92!. We present a proof of security which applies to realistic sources, and to untrustable sources which can be placed outside the labs of the two receivers. The proof is restricted ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Quantum Information Processing
دوره 13 شماره
صفحات -
تاریخ انتشار 2014