Abstract

In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag. We address the question of whether quantum resources can offer any advantage over classical unconditionally secure message authentication codes. It is shown that a broad class of symmetric prepare-and-measure quantum message-authentication schemes cannot do better than their classical counterparts.

Highlights

  • One of the main information security objectives is to provide assurance about the original source of a received message [1,2,3,4]

  • On the other hand, provides assurance of the identity of the sender of the message, in addition to data integrity. From another point of view, data origin authentication implicitly provides data integrity, in the sense that if the message is somehow modified, essentially the source of the message has changed. Another security objective that is closely related to data origin authentication, is the so-called non-repudiation, which prevents the original sender of a specific message from denying to a third party his/her action

  • For any quantum MAC (QMAC) that falls within the aforementioned framework and involves deterministic decision making, the deception probability for the impersonation attack is higher than what can be achieved by unconditionally secure classical message-authentication codes (MACs)

Read more

Summary

Introduction

One of the main information security objectives is to provide assurance about the original source of a received message [1,2,3,4] This goal is usually referred to as data origin authentication, and it is a stronger version of another cryptographic goal, the so-called data integrity. From another point of view, data origin authentication implicitly provides data integrity, in the sense that if the message is somehow modified, essentially the source of the message has changed Another security objective that is closely related to data origin authentication, is the so-called non-repudiation, which prevents the original sender of a specific message from denying to a third party his/her action. Cryptography 2020, 4, 31 they typically rely on public-key cryptography [1,2] Both MACs and digital-signature schemes offer data origin authentication, but only the latter can ensure non-repudiation.

Unconditionally Secure Classical MACs
Theoretical Framework for Unconditionally Secure Prepare-and-Measure QMACs
Results
A QMAC with Quantum Key
Decision Making Based on a Symmetry Test
Summary
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call