Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements

被引:46
|
作者
Lin, Jason [1 ]
Yang, Chun-Wei [1 ]
Tsai, Chia-Wei [2 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
[2] Inst Informat Ind, Smart Network Syst Inst, Taipei 105, Taiwan
关键词
GHZ-like state; Intercept-resend attack; Quantum cryptography; Quantum secret sharing; Trojan horse attack;
D O I
10.1007/s10773-012-1314-4
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Li et al. [Phys. Rev. A 82(2):022303, 2010] presented two semi-quantum secret sharing (SQSS) protocols using Greenberger-Horne-Zeilinger-like states. The proposed schemes are quite practical because only the secret dealer needs to be equipped with advanced quantum devices such as quantum memory, whereas the other agents can merely perform classical operations to complete the secret sharing. However, the present study demonstrates the existence of a security pitfall in the eavesdropping check phase of both the schemes, which can lead to an intercept-resend attack and a Trojan horse attack on the two schemes by a dishonest agent, to determine the other agent's shadow and consequently derive the master key of the SQSS. This contradicts the security requirement of QSS. Fortunately, two possible solutions are proposed herein to eliminate this security pitfall.
引用
收藏
页码:156 / 162
页数:7
相关论文
共 50 条
  • [1] Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements
    Jason Lin
    Chun-Wei Yang
    Chia-Wei Tsai
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2013, 52 : 156 - 162
  • [2] Intercept-resend attacks on Chen et al.'s quantum private comparison protocol and the improvements
    Lin, Jason
    Tseng, Hsin-Yi
    Hwang, Tzonelih
    OPTICS COMMUNICATIONS, 2011, 284 (09) : 2412 - 2414
  • [3] Quantum key distribution with several intercept-resend attacks via a depolarizing channel
    Dehmani, Mustapha
    Errahmani, Mohamed
    Ez-Zahraouy, Hamid
    Benyoussef, Abdelilah
    PHYSICA SCRIPTA, 2012, 86 (01)
  • [4] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
    Zhang Sheng
    Wang Jian
    Tang Chao-Jing
    CHINESE PHYSICS B, 2012, 21 (06)
  • [5] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
    张盛
    王剑
    唐朝京
    Chinese Physics B, 2012, 21 (06) : 37 - 44
  • [6] Enhancing quantum time transfer security: detecting intercept-resend attacks with energy-time entanglement
    Quan, Runai
    Hong, Huibo
    Xiang, Xiao
    Cao, Mingtao
    Li, Xinghua
    Li, Baihong
    Dong, Ruifang
    Liu, Tao
    Zhang, Shougang
    NEW JOURNAL OF PHYSICS, 2024, 26 (09):
  • [7] Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack
    Adrian Lizama-Perez, Luis
    Mauricio Lopez, Jose
    De Carlos Lopez, Eduardo
    ENTROPY, 2017, 19 (01):
  • [8] Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
    Fladung, Lukas
    Nikolopoulos, Georgios M.
    Alber, Gernot
    Fischlin, Marc
    CRYPTOGRAPHY, 2019, 3 (04) : 1 - 17
  • [9] Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
    Gao, Xiang
    Zhang, Shibin
    Chang, Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (08) : 2512 - 2520
  • [10] Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
    Xiang Gao
    Shibin Zhang
    Yan Chang
    International Journal of Theoretical Physics, 2017, 56 : 2512 - 2520