Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks

被引:8
作者
Iwakoshi, Takehisa [1 ]
机构
[1] Mie Univ, Dept Informat Engn, Tsu, Mie 5148507, Japan
关键词
Protocols; Security; Optical transmitters; Cryptography; Encryption; Quantum state; Generators; Beyond Shannon-limit of cryptography; information-theoretic security; physical-layer encryption; quantum multi-hypotheses testing theory; secure communications; KEY DISTRIBUTION;
D O I
10.1109/ACCESS.2021.3056494
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we concretely formulate to derive the attacker's success probability of obtaining the shared secret keys for the Y00 protocol under a combination of a quantum collective attack with infinitely-long known-plaintext, naming it "collective known-plaintext attack" in this work. In contrast, our previous work showed only the necessary condition to design Y00 transmitters to be information-theoretic secure. The keystone of the security evaluations in this work is the time-translational symmetry of the Y00 signals modulated by pseudo-random number generators, such as linear-feedback shift registers or Mersenne twisters. With the assist of a true-random deliberate-signal-randomization, information-theoretic security would be realized. By numerical simulations, we can determine whether the designed Y00 transmitters are information-theoretic secure. However, this work's security evaluation may not apply to the transmitters with cryptographically-secure pseudo-random number generators because they might not have time-translational symmetry, even though such Y00 transmitters may be securer. We also describe future challenges for theorists to accelerate designing securer Y00 transmitters.
引用
收藏
页码:31608 / 31617
页数:10
相关论文
共 41 条
[1]  
Alimomeni Mohsen, 2012, Information Theoretic Security. Proceedings of the 6th International Conference, ICITS 2012, P1, DOI 10.1007/978-3-642-32284-6_1
[2]  
[Anonymous], 2018, 27000 ISOIEC
[3]   Secure communication using mesoscopic coherent states [J].
Barbosa, GA ;
Corndorf, E ;
Kumar, P ;
Yuen, HP .
PHYSICAL REVIEW LETTERS, 2003, 90 (22) :4
[4]  
Bennett C H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[5]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[6]   Security of quantum key distribution against all collective attacks [J].
Biham, E ;
Boyer, M ;
Brassard, G ;
van de Graaf, J ;
Mor, T .
ALGORITHMICA, 2002, 34 (04) :372-388
[7]  
Capocelli R. M., 1993, LNCS, V6, P157, DOI DOI 10.1007/978-3-319-04268-87
[8]  
Chen Lidong., 2012, Communication System Security
[9]   Security of Y-00 under heterodyne measurement and fast correlation attack [J].
Donnet, Stephane ;
Thangaraj, Andrew ;
Bloch, Matthieu ;
Cussey, Johann ;
Merolla, Jean-Marc ;
Larger, Laurent .
PHYSICS LETTERS A, 2006, 356 (06) :406-410
[10]  
Futami F., 2020, P OPT FIB COMM C OFC, DOI [10.1364/OFC.2020.M4A.3, DOI 10.1364/OFC.2020.M4A.3]