Quantum Oblivious Mutual Identification
نویسندگان
چکیده
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and efficient protocol based on the exchange of quantum information to check mutual knowledge of a common string in such a way that honest parties will always succeed in convincing each other, while a dishonest party interacting with an honest party will have vanishingly small probability of convincing him. Moieover, a dishonest party gains only d very small amount, of information about t,he secret string from running the protocol: whoever enters the protocol with no knowledge of the secret string would have to enter this protocol an exponential number of times in order to gain non-negligible information about the string. Our scheme offers an efficient identification technique with a security that depends on no computational assumption, only on the correctness of quantum mechanics. We believe such a system should be used in smartcards to avoid frauds from typing PIN codes to dishonest teller machines. 1 In t 1-0 d u c t i o 11 Weren’t you worried tlie last time you typed your PIN (Personal Identification Number) to an unknown teller machine that it could be a fake and that its sole purpose could he to steal your PIN? According to a recent headline of the NY Times [as] maybe YOU should worry: “ONE LESS THING TO BELIEVE IN: FRAUD AT FAKE CASH MACHINE” The problem with current identification systems is that the customer must trust tlie equipment to which he types his PIN. It is completely trivial to modify a teller machine to memorize the PIN numbers that people type to it. PINS are meant to be checked, not given. (Consult [I] for an extensive study of frauds at teller machines.) Of course, it is always possible to completely solve the problem of identification and authentication of messages by classical methods [9] that require L.C. Guillou and J.-J. Quisquater (Eds.): Advances in Cryptology EUROCRYPT ’95, LNCS 921, pp. 133-146, 1995. 0 Spnnger-Verlag Berlin Heidelberg 1995
منابع مشابه
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious trans...
متن کاملClassical and Quantum Strategies for Two-Prover Bit Commitments
First we show that the assumption behind the Two-Prover Zero-knowledge Interactive proof of BenOr, Goldwasser, Kilian and Wigderson [5] is too weak and need be made more precise to preserve soundness of their construction. Secondly, we introduce a Two-Prover Zero-knowledge Interactive proof similar to theirs and demonstrate that classically it is equally secure as the original but however, we l...
متن کاملSecure Identification In The Isolated Qubits Model
Oblivious transfer is a powerful cryptographic primitive that is complete for secure multi-party computation. In oblivious transfer protocols a user sends one or more messages to a receiver, while the sender remains oblivious as to which messages have been received. Protocols for oblivious transfer cannot exist in a classical or fully-quantum world, but can be implemented by restricting the use...
متن کاملRobust cryptography in the noisy-quantum-storage model
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that quantum storage of qubits is noisy. In this work we analyze a protocol for the universal task of oblivious transfer that can be implemented using quantumkey-distribution (QKD) hardware in the practical setting where honest participants are unable to perform noise-free operations. We derive trade-o...
متن کاملQuantum Oblivious Mutual Identiication
We consider a situation where two parties, Alice and Bob, share a common secret string and would like to mutually check their knowledge of that string. We describe a simple and eecient protocol based on the exchange of quantum information to check mutual knowledge of a common string in such a way that honest parties will always succeed in convincing each other, while a dishonest party interacti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995