Abstract
In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag. We address the question of whether quantum resources can offer any advantage over classical unconditionally secure message authentication codes. It is shown that a broad class of symmetric prepare-and-measure quantum message-authentication schemes cannot do better than their classical counterparts.
Highlights
One of the main information security objectives is to provide assurance about the original source of a received message [1,2,3,4]
On the other hand, provides assurance of the identity of the sender of the message, in addition to data integrity. From another point of view, data origin authentication implicitly provides data integrity, in the sense that if the message is somehow modified, essentially the source of the message has changed. Another security objective that is closely related to data origin authentication, is the so-called non-repudiation, which prevents the original sender of a specific message from denying to a third party his/her action
For any quantum MAC (QMAC) that falls within the aforementioned framework and involves deterministic decision making, the deception probability for the impersonation attack is higher than what can be achieved by unconditionally secure classical message-authentication codes (MACs)
Summary
One of the main information security objectives is to provide assurance about the original source of a received message [1,2,3,4] This goal is usually referred to as data origin authentication, and it is a stronger version of another cryptographic goal, the so-called data integrity. From another point of view, data origin authentication implicitly provides data integrity, in the sense that if the message is somehow modified, essentially the source of the message has changed Another security objective that is closely related to data origin authentication, is the so-called non-repudiation, which prevents the original sender of a specific message from denying to a third party his/her action. Cryptography 2020, 4, 31 they typically rely on public-key cryptography [1,2] Both MACs and digital-signature schemes offer data origin authentication, but only the latter can ensure non-repudiation.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have