Skip to main content
Erschienen in: Quantum Information Processing 11/2018

01.11.2018

Comment on “A novel quantum deniable authentication protocol without entanglement”

verfasst von: Hao Cao, Wenping Ma

Erschienen in: Quantum Information Processing | Ausgabe 11/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Shi et al. (Quantum Inf Process 14(6):2183–2193, 2015) proposed a novel quantum deniable authentication protocol in which new shared secret keys can be updated timely with the help of a trusted party, and the fact that only the specified receiver could identify the true source of a given message is guaranteed by the new shared secret keys generated in the key update phase. Hence, the core of Shi et al.’s protocol is the key update phase . However, the analysis in this paper shows that there is a bug in the key update phase, which can lead to the failure of updating the shared key. Furthermore, an improved simple method is proposed to mitigate the security weakness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, pp. 175–179 (1984)
2.
Zurück zum Zitat Liao, S.K., Yong, H.L., Liu, C., et al.: Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat. Photonics 11, 509–513 (2017)CrossRef Liao, S.K., Yong, H.L., Liu, C., et al.: Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat. Photonics 11, 509–513 (2017)CrossRef
3.
Zurück zum Zitat Cao, H., Ma, W.: (t, n) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9, 1–7 (2017) Cao, H., Ma, W.: (t, n) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9, 1–7 (2017)
4.
Zurück zum Zitat Gong, L.H., Song, H.C., He, C.S.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)ADSCrossRef Gong, L.H., Song, H.C., He, C.S.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)ADSCrossRef
5.
Zurück zum Zitat He, Y.F., Ma, W.P.: Three-party quantum secure direct communication against collective noise. Quantum Inf. Process. 16, 252 (2017)ADSMathSciNetCrossRef He, Y.F., Ma, W.P.: Three-party quantum secure direct communication against collective noise. Quantum Inf. Process. 16, 252 (2017)ADSMathSciNetCrossRef
6.
Zurück zum Zitat Guo, F.Z., Gao, F., Qin, S.J.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process. 12, 2793–2802 (2013)ADSMathSciNetCrossRef Guo, F.Z., Gao, F., Qin, S.J.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process. 12, 2793–2802 (2013)ADSMathSciNetCrossRef
7.
Zurück zum Zitat Cao, H., Ma, W.: Multiparty quantum key agreement based on quantum search algorithm. Sci. Rep. 7, 45046 (2017)ADSCrossRef Cao, H., Ma, W.: Multiparty quantum key agreement based on quantum search algorithm. Sci. Rep. 7, 45046 (2017)ADSCrossRef
8.
Zurück zum Zitat Hillery, M., Ziman, M., Bužek, V.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)ADSCrossRef Hillery, M., Ziman, M., Bužek, V.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)ADSCrossRef
9.
Zurück zum Zitat Jiang, L., He, G., Nie, D.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)ADSCrossRef Jiang, L., He, G., Nie, D.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)ADSCrossRef
10.
Zurück zum Zitat Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55, 2303–2310 (2016)MathSciNetCrossRef Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55, 2303–2310 (2016)MathSciNetCrossRef
11.
Zurück zum Zitat Thapliyal, K., Sharma, R.D., Pathak, A.: Protocols for quantum binary voting. Int. J. Quantum Inf. 15, 1750007 (2017)CrossRef Thapliyal, K., Sharma, R.D., Pathak, A.: Protocols for quantum binary voting. Int. J. Quantum Inf. 15, 1750007 (2017)CrossRef
12.
Zurück zum Zitat Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)ADSCrossRef Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)ADSCrossRef
13.
Zurück zum Zitat Barnum, H., Crépeau, C., Gottesman, D., et al.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, pp. 449–458. IEEE (2002) Barnum, H., Crépeau, C., Gottesman, D., et al.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, pp. 449–458. IEEE (2002)
14.
Zurück zum Zitat Bartkiewicz, K., Černoch, A., Lemr, K.: Using quantum routers to implement quantum message authentication and Bell-state manipulation. Phys. Rev. A 90, 022335 (2014)ADSCrossRef Bartkiewicz, K., Černoch, A., Lemr, K.: Using quantum routers to implement quantum message authentication and Bell-state manipulation. Phys. Rev. A 90, 022335 (2014)ADSCrossRef
15.
Zurück zum Zitat Yao, Y., Gao, M., Li, M.: Quantum cloning attacks against PUF-based quantum authentication systems. Quantum Inf. Process. 15, 3311–3325 (2016)ADSMathSciNetCrossRef Yao, Y., Gao, M., Li, M.: Quantum cloning attacks against PUF-based quantum authentication systems. Quantum Inf. Process. 15, 3311–3325 (2016)ADSMathSciNetCrossRef
16.
Zurück zum Zitat Portmann, C.: Quantum authentication with key recycling. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 339–368. Springer, Cham (2017) Portmann, C.: Quantum authentication with key recycling. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 339–368. Springer, Cham (2017)
17.
Zurück zum Zitat Shi, W.M., Zhou, Y.H., Yang, Y.G.: Quantum deniable authentication protocol. Quantum Inf. Process. 13, 1501–1510 (2014)ADSMathSciNetCrossRef Shi, W.M., Zhou, Y.H., Yang, Y.G.: Quantum deniable authentication protocol. Quantum Inf. Process. 13, 1501–1510 (2014)ADSMathSciNetCrossRef
18.
Zurück zum Zitat Shi, W.M., Zhang, J.B., Zhou, Y.H.: A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14, 2183–2193 (2015)ADSMathSciNetCrossRef Shi, W.M., Zhang, J.B., Zhou, Y.H.: A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14, 2183–2193 (2015)ADSMathSciNetCrossRef
19.
Zurück zum Zitat Shi, W.M., Zhou, Y.H., Yang, Y.G.: A restricted quantum deniable authentication protocol applied in electronic voting system. Optik 142, 9–12 (2017)ADSCrossRef Shi, W.M., Zhou, Y.H., Yang, Y.G.: A restricted quantum deniable authentication protocol applied in electronic voting system. Optik 142, 9–12 (2017)ADSCrossRef
Metadaten
Titel
Comment on “A novel quantum deniable authentication protocol without entanglement”
verfasst von
Hao Cao
Wenping Ma
Publikationsdatum
01.11.2018
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 11/2018
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2062-z

Weitere Artikel der Ausgabe 11/2018

Quantum Information Processing 11/2018 Zur Ausgabe

Neuer Inhalt