Abstract

An interesting protocol for quantum identity authentication on a basis of the classic shared secret has been presented recently (Hong et al. in Quantum Inf Process 16(10): 236, 2017). It requires few resources and it is technologically feasible. Its seminal analysis focuses on average eavesdropper’s information gain per single protocol run—a parameter suitable for estimation of the security margin applicable to the protocols aiming at provision of confidentiality. However, the security requirements of the authentication process are very stringent—no single bit of the secret can be revealed, otherwise the eavesdropper can collect subsequent bits of the secret in successive protocol runs. The failure of the seminal version to meet this requirement is demonstrated. The sequential processing of qubits and the static nature of the compared data is the rationale behind the improvement. The introduced changes make that partial information gained in some authentication attempt gives the eavesdroppers no advantage in breaking the next ones. They are forced to consider each authentication transaction as a separate puzzle that can be solved according to all-or-nothing paradigm. The improvement retains conceptual simplicity and technological feasibility of the seminal version of the protocol.

Highlights

  • The quantum cryptography, since the pioneering works of Wiesner [1], Ingarden [2] and Bennett et al [3], grew up into a full-blown research discipline

  • The problem of constructing the entangling probe for this version of encoding remains an open question. It has been shown in the preceding section that analysis provided by the seminal presentation of the protocol is not complete as it does not take into account requirements specific for the authentication process

  • The static value of the compared secret and its sequential processing bit by bit are the main properties that seriously diminish offered security margin. These deficiencies can be removed by supplementing the quantum communication with the classical data processing

Read more

Summary

Introduction

The quantum cryptography, since the pioneering works of Wiesner [1], Ingarden [2] and Bennett et al [3], grew up into a full-blown research discipline. Quantum key distribution (QKD) [3,4,6,7,8], quantum direct communication (QDC) [9,10,11,12], quantum secret sharing (QSS) [13,14], quantum private comparison (QPC)

Page 2 of 12
Analysis
Message mode:
Man-in-the-middle attack
Entangle and discriminate attack
Page 6 of 12
Page 8 of 12
Results
Page 10 of 12
Conclusion
Page 12 of 12
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.