Cryptanalysis and improvement of the measurement-device-independent quantum key distribution with hyper-encoding

被引:0
作者
Lin, Jason [1 ]
Tsai, Chia-Wei [2 ]
Yang, Chun-Wei [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, 145 Xingda Rd,South Dist, Taichung 40227, Taiwan
[2] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, 129,Sec 3,Sanmin Rd,North Dist, Taichung 40401, Taiwan
[3] China Med Univ, Coll Humanities & Sci, Master Program Digital Hlth Innovat, 100,Sec 1,Jingmao Rd, Taichung 406040, Taiwan
关键词
Measurement-device-independent; quantum key distribution; dishonest third party; quantum cryptography; SECURITY; PROTOCOL; ATTACK; STATES;
D O I
10.1142/S0217732322502121
中图分类号
P1 [天文学];
学科分类号
0704 ;
摘要
Recently, Cui et al. [Sci. China Phys. 62, 110311 (2019)] proposed a measurement-device-independent quantum key distribution (MDI-QKD) scheme based on high-dimensional encoding to increase the channel capacity of each individual photon. A secret key is shared among two legitimate parties via the help of a dishonest third-party (TP). They claimed that the proposed protocol can improve the drawback of the low-key generation rate that existed in the past MDI-QKD schemes. However, this study pointed out a loophole during the security check of TP. That is, the two legitimate participants merely use the corresponding qubit pairs that are both generated in the diagonal basis for the discussion, which leads to a potential attack that not only allows TP to avoid the security check but also creates partial inconsistency of key bits for both communicating sides. Fortunately, this problem can be fixed by a minor correction of the protocol.
引用
收藏
页数:15
相关论文
共 77 条
[1]   Magnetically charged black holes from non-linear electrodynamics and the Event Horizon Telescope [J].
Allahyari, Alireza ;
Khodadi, Mohsen ;
Vagnozzi, Sunny ;
Mota, David F. .
JOURNAL OF COSMOLOGY AND ASTROPARTICLE PHYSICS, 2020, (02)
[2]   Predicting mental health of prisoners by artificial neural network [J].
Allahyari, Elahe ;
Moshtagh, Mozhgan .
BIOMEDICINE-TAIWAN, 2021, 11 (01) :26-33
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[5]   Security of quantum key distribution against all collective attacks [J].
Biham, E ;
Boyer, M ;
Brassard, G ;
van de Graaf, J ;
Mor, T .
ALGORITHMICA, 2002, 34 (04) :372-388
[6]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[7]   One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering [J].
Branciard, Cyril ;
Cavalcanti, Eric G. ;
Walborn, Stephen P. ;
Scarani, Valerio ;
Wiseman, Howard M. .
PHYSICAL REVIEW A, 2012, 85 (01)
[8]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[9]   One-sided measurement-device-independent quantum key distribution [J].
Cao, Wen-Fei ;
Zhen, Yi-Zheng ;
Zheng, Yu-Lin ;
Li, Li ;
Chen, Zeng-Bing ;
Liu, Nai-Le ;
Chen, Kai .
PHYSICAL REVIEW A, 2018, 97 (01)
[10]  
Chau H. F., ARXIV