Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

06/16/2018
by   Michel Boyer, et al.
0

A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the "simplified Mirror protocol") to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/03/2020

Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

Semi-quantum key distribution (SQKD) allows two parties (Alice and Bob) ...
research
09/06/2019

Lightweight Mediated Semi-Quantum Key Distribution Protocol with a Dishonest Third Party based on Bell States

The mediated semi-quantum key distribution (MSQKD) protocol is an import...
research
01/09/2018

An efficient and secure two-party key agreement protocol based on chaotic maps

Secure communication is a matter of genuine concern that includes means ...
research
08/13/2020

Experimental demonstrations of unconditional security in a purely classical regime

So far, unconditional security in key distribution processes has been co...
research
09/06/2022

Classification Protocols with Minimal Disclosure

We consider multi-party protocols for classification that are motivated ...
research
04/05/2021

TinyAKE: A More Practicable and Trustable Scheme for Authenticated Key Establishment in WSNs

The characteristics of high loss rate, resource constraint, being eager ...
research
01/16/2020

Finite Key Analysis of the Extended B92 Protocol

In this paper we derive a key rate expression for the extended version o...

Please sign up or login with your details

Forgot password? Click here to reset