Concerning Quantum Identification Without Entanglement

03/26/2020
by   González-Guillén, et al.
0

Identification schemes are interactive protocols typically involving two parties, a prover, who wants to provide evidence of his or her identity and a verifier, who checks the provided evidence and decide whether it comes or not from the intended prover. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki, and give a concrete attack upholding theoretical impossibility results from Lo and Buhrman et al. More precisely, we show that using a simple strategyan adversary may indeed obtain non-negligible information on the shared identification secret. While the security of a quantum identity authentication scheme is not formally defined in [1], it is clear that such a definition should somehow imply that an external entity may gain no information on the shared identification scheme (even if he actively participates injecting messages in a protocol execution, which is not assumed in our attack strategy).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/08/2021

A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

Secure communication has achieved a new dimension with the advent of the...
research
07/07/2020

Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States

Recently, Yan et al. proposed a quantum secure direct communication (QSD...
research
06/08/2020

Client-Server Identification Protocols with Quantum PUF

Recently, major progress has been made towards the realisation of the qu...
research
10/21/2022

A^2RID – Anonymous Direct Authentication and Remote Identification of Commercial Drones

The recent worldwide introduction of RemoteID (RID) regulations forces a...
research
08/14/2020

A novel three party Quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing

In this work, we present a quantum secret sharing scheme based on Bell s...
research
08/01/2021

Remote quantum-safe authentication of entities with physical unclonable functions

Physical unclonable functions have been shown a useful resource of rando...
research
07/31/2018

Peripheral Authentication for Parked Vehicles over Wireless Radio Communication

Peripheral authentication is an important aspect in the vehicle networks...

Please sign up or login with your details

Forgot password? Click here to reset