Skip to main content
Erschienen in: Quantum Information Processing 4/2014

01.04.2014

Man-in-the-middle attack on quantum secure communications with authentication

verfasst von: Tzu Han Lin, Tzonelish Hwang

Erschienen in: Quantum Information Processing | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This study points out a man-in-the-middle (MIM) attack on many of quantum secure communication with authentication protocols. The MIM attack is due to a design carelessness on performing public discussions on a nonauthenticated classical channel. A possible solution is proposed to solve the problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189–3192 (2009)CrossRefADS Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189–3192 (2009)CrossRefADS
2.
Zurück zum Zitat Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)CrossRefADS Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)CrossRefADS
3.
Zurück zum Zitat Liu, W.J., Chen, H.W., Ma, T.H., Li, Z.Q., Liu, Z.H., Hu, W.B.: An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication. Chin. Phys. B 18(10), 4105–4109 (2009)CrossRefADS Liu, W.J., Chen, H.W., Ma, T.H., Li, Z.Q., Liu, Z.H., Hu, W.B.: An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication. Chin. Phys. B 18(10), 4105–4109 (2009)CrossRefADS
4.
Zurück zum Zitat Kanamori, Y., Yoo, S.-M., Gregory, D.A., Sheldon, F.T.: Authentication protocol using quantum superposition states. Int. J. Netw. Secur. 9(2), 101–108 (2009) Kanamori, Y., Yoo, S.-M., Gregory, D.A., Sheldon, F.T.: Authentication protocol using quantum superposition states. Int. J. Netw. Secur. 9(2), 101–108 (2009)
5.
Zurück zum Zitat Chen, Z.-N., Zheng, Q., Lu, L.: A quantum secure direct communication with authentication. Inf. Technol. J. 8(7), 1027–1032 (2009)CrossRefADS Chen, Z.-N., Zheng, Q., Lu, L.: A quantum secure direct communication with authentication. Inf. Technol. J. 8(7), 1027–1032 (2009)CrossRefADS
6.
Zurück zum Zitat Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27(5), 050306 (2010)CrossRefADS Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27(5), 050306 (2010)CrossRefADS
7.
Zurück zum Zitat Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Cryptanalysis of quantum secure direct communication and authentication scheme via Bell states. Chin. Phys. Lett. 28(2), 020303 (2011)CrossRefADS Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Cryptanalysis of quantum secure direct communication and authentication scheme via Bell states. Chin. Phys. Lett. 28(2), 020303 (2011)CrossRefADS
8.
Zurück zum Zitat Huang, P., Zhu, J.U.N., Lu, Y., Zeng, G.-H.: Quantum identity authentication using Gaussian-modulated squeezed states. Int. J. Quantum Inf. 09(02), 701–721 (2011)CrossRefMATH Huang, P., Zhu, J.U.N., Lu, Y., Zeng, G.-H.: Quantum identity authentication using Gaussian-modulated squeezed states. Int. J. Quantum Inf. 09(02), 701–721 (2011)CrossRefMATH
9.
Zurück zum Zitat Naseri, M.: An efficient protocol for quantum secure dialogue with authentication by using single photons. Int. J. Quantum Inf. 9(07n08), 1677–1684 (2011)MathSciNetCrossRefMATH Naseri, M.: An efficient protocol for quantum secure dialogue with authentication by using single photons. Int. J. Quantum Inf. 9(07n08), 1677–1684 (2011)MathSciNetCrossRefMATH
10.
Zurück zum Zitat Tsai, C.-W., Wei, T.-S., Hwang, T.: One-way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56(6), 1023–1026 (2011)CrossRefADSMATH Tsai, C.-W., Wei, T.-S., Hwang, T.: One-way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56(6), 1023–1026 (2011)CrossRefADSMATH
11.
Zurück zum Zitat Shen, D., Ma, W., Yin, X., Li, X.: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825–1835 (2012) Shen, D., Ma, W., Yin, X., Li, X.: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825–1835 (2012)
12.
Zurück zum Zitat Yang, Y.-G., Jia, X., Xia, J., Shi, L., Zhang, H.: Comment on “Quantum secure direct communication with authentication expansion using single photons”. Int. J. Theor. Phys. 51(12), 3681–3687 (2012)MathSciNetCrossRefMATH Yang, Y.-G., Jia, X., Xia, J., Shi, L., Zhang, H.: Comment on “Quantum secure direct communication with authentication expansion using single photons”. Int. J. Theor. Phys. 51(12), 3681–3687 (2012)MathSciNetCrossRefMATH
13.
Zurück zum Zitat Yu, C.-H., Guo, G.-D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 52(6), 1937–1945 (2012) Yu, C.-H., Guo, G.-D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 52(6), 1937–1945 (2012)
14.
Zurück zum Zitat Wang, J., Zhang, Q., Tang, C.J.: Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 23(9), 2360–2363 (2006)CrossRefADS Wang, J., Zhang, Q., Tang, C.J.: Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 23(9), 2360–2363 (2006)CrossRefADS
15.
Zurück zum Zitat Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 042305 (2006) Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 042305 (2006)
16.
Zurück zum Zitat Zhang, Z.-J., Liu, J., Wang, D., Shi, S.-H.: Comment on “Quantum direct communication with authentication”. Phys. Rev. A 75(2), 026301 (2007) Zhang, Z.-J., Liu, J., Wang, D., Shi, S.-H.: Comment on “Quantum direct communication with authentication”. Phys. Rev. A 75(2), 026301 (2007)
17.
Zurück zum Zitat Wang, M.-J., Pan, W.: Quantum secure direct communication based on authentication. Chin. Phys. Lett. 25(11), 3860–3863 (2008)CrossRefADS Wang, M.-J., Pan, W.: Quantum secure direct communication based on authentication. Chin. Phys. Lett. 25(11), 3860–3863 (2008)CrossRefADS
18.
Zurück zum Zitat Liu, W.-J., Chen, H.-W., Li, Z.-Q., Liu, Z.-H.: Efficient quantum secure direct communication with authentication. Chin. Phys. Lett. 25(7), 2354–2357 (2008)MathSciNetCrossRefADS Liu, W.-J., Chen, H.-W., Li, Z.-Q., Liu, Z.-H.: Efficient quantum secure direct communication with authentication. Chin. Phys. Lett. 25(7), 2354–2357 (2008)MathSciNetCrossRefADS
19.
Zurück zum Zitat Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9(5–6), 376–394 (2009)MathSciNetMATH Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9(5–6), 376–394 (2009)MathSciNetMATH
20.
Zurück zum Zitat Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: High efficiency of two efficient QSDC with authentication is at the cost of their security. Chin. Phys. Lett. 26(2), 020312 (2009)CrossRefADS Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: High efficiency of two efficient QSDC with authentication is at the cost of their security. Chin. Phys. Lett. 26(2), 020312 (2009)CrossRefADS
21.
Zurück zum Zitat Yang, Y.-G., Wen, Q.-Y.: Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states. Chin. Phys. B 18(8), 3233–3237 (2009)CrossRefADS Yang, Y.-G., Wen, Q.-Y.: Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states. Chin. Phys. B 18(8), 3233–3237 (2009)CrossRefADS
22.
Zurück zum Zitat Yang, J., Wang, C., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54(5), 829–834 (2010)MathSciNetCrossRefADSMATH Yang, J., Wang, C., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54(5), 829–834 (2010)MathSciNetCrossRefADSMATH
23.
Zurück zum Zitat Yang, Y.G., Wang, Y.H., Wen, Q.Y.: Quantum broadcast communication with authentication. Chin. Phys. B 19(7), 070304 (2010)CrossRefADS Yang, Y.G., Wang, Y.H., Wen, Q.Y.: Quantum broadcast communication with authentication. Chin. Phys. B 19(7), 070304 (2010)CrossRefADS
24.
Zurück zum Zitat Yang, Y.-G., Tian, J., Xia, J., Zhang, H.: Quantum authenticated direct communication using Bell states. Int. J. Theor. Phys. 52(2), 336–344 (2012)MathSciNetCrossRefMATH Yang, Y.-G., Tian, J., Xia, J., Zhang, H.: Quantum authenticated direct communication using Bell states. Int. J. Theor. Phys. 52(2), 336–344 (2012)MathSciNetCrossRefMATH
25.
Zurück zum Zitat Yang, Y.-G., Wang, H.-Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger–Horne–Zeilinger states. Int. J. Theor. Phys. 52(2), 524–530 (2012)MathSciNetCrossRefMATH Yang, Y.-G., Wang, H.-Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger–Horne–Zeilinger states. Int. J. Theor. Phys. 52(2), 524–530 (2012)MathSciNetCrossRefMATH
26.
27.
Zurück zum Zitat Bennett, C.H., Brassard, G: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and, Signal Processing, pp. 175–179 (1984) Bennett, C.H., Brassard, G: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and, Signal Processing, pp. 175–179 (1984)
Metadaten
Titel
Man-in-the-middle attack on quantum secure communications with authentication
verfasst von
Tzu Han Lin
Tzonelish Hwang
Publikationsdatum
01.04.2014
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 4/2014
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0701-y

Weitere Artikel der Ausgabe 4/2014

Quantum Information Processing 4/2014 Zur Ausgabe

Neuer Inhalt