期刊文献+

Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad 被引量:2

Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad
下载PDF
导出
摘要 The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol.Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol.Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期59-64,共6页 中国物理B(英文版)
基金 supported by the National Natural Science Foundation of China(Grant Nos.61502101 and 61170321) the Natural Science Foundation of Jiangsu Province,China(Grant No.BK20140651) the Research Fund for the Doctoral Program of Higher Education,China(Grant No.20110092110024) Funded by PAPD CICAEET
关键词 CRYPTANALYSIS quantum broadcast communication information leakage intercept-measure-resendattack CNOT-operation attack cryptanalysis, quantum broadcast communication, information leakage, intercept-measure-resendattack, CNOT-operation attack
  • 相关文献

参考文献39

  • 1Bennett C H and Brassard G 1984 IEEE International Conference on Computers, Systems & Signal Processing, December 10-12, Bangalore, India, p. 175. 被引量:1
  • 2Ekert A K 1991 Phys. Rev. Lett. 67 661. 被引量:1
  • 3Bennett C H 1992 Phys. Rev. Lett. 68 3121. 被引量:1
  • 4Bennett C H, Brassard G and Mermin N D 1992 Phys. Rev. Lett. 68 557. 被引量:1
  • 5Bruβ D 1998 Phys. Rev. Lett. 81 3018. 被引量:1
  • 6Wang X B 2004 Phys. Rev. Lett. 92 077902. 被引量:1
  • 7Lo H K, Ma X F and Chen K 2005 Phys. Rev. Lett. 94 230504. 被引量:1
  • 8Boyer M, Kenigsberg D and Mor T 2007 Phys. Rev. Lett. 99 140501. 被引量:1
  • 9Noh T G 2009 Phys. Rev. Lett. 103 230501. 被引量:1
  • 10Tang Y L, Yin H L, Chen S J, Liu Y, Zhang W J, Jiang X, Zhang L, Wang J, You L X, Guan J Y, Yang D X, Wang Z, Liang H, Zhang Z, Zhou N, Ma X F, Chen T Y, Zhang Q and Pan J W 2014 Phys. Rev. Lett. 113 190501. 被引量:1

同被引文献11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部