Security aspects of the authentication used in quantum cryptography

被引:0
作者
Cederlof, Jorgen [1 ]
Larsson, Jan-Ake [1 ]
机构
[1] Linkoping Univ, S-58183 Linkoping, Sweden
来源
FOUNDATIONS OF PROBABILITY AND PHYSICS - 4 | 2007年 / 889卷
关键词
quantum cryptography; quantum key distribution; quantum key growing; authentication;
D O I
暂无
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Unconditionally secure message authentication is an important part of Quantum Cryptography (QC). We analyze security effects of using a key obtained from QC in later rounds of QC. It has been determined earlier that partial knowledge of the key in itself does not incur a security problem. However, by accessing the quantum channel used in QC, the attacker can change the message to be authenticated. This, together with partial knowledge of the key does incur a security weakness of the authentication. We suggest a simple solution to this problem, and stress usage of this or an equivalent extra security measure in QC.
引用
收藏
页码:162 / +
页数:2
相关论文
共 19 条
[11]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[12]   Estimates for practical quantum cryptography [J].
Lütkenhaus, N .
PHYSICAL REVIEW A, 1999, 59 (05) :3301-3319
[13]  
Mayers D., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P343
[14]   Quantum cryptography with imperfect apparatus [J].
Mayers, D ;
Yao, A .
39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, :503-509
[15]   Entangled state quantum cryptography: Eavesdropping on the Ekert protocol [J].
Naik, DS ;
Peterson, CG ;
White, AG ;
Berglund, AJ ;
Kwiat, PG .
PHYSICAL REVIEW LETTERS, 2000, 84 (20) :4733-4736
[16]  
SCHNEIER B, 1993, APPL CRYPTOGRAPHY
[17]   Simple proof of security of the BB84 quantum key distribution protocol [J].
Shor, PW ;
Preskill, J .
PHYSICAL REVIEW LETTERS, 2000, 85 (02) :441-444
[18]  
STINSON DR, 1991, ADV CRYPTOLOGY, V576, P74
[19]   NEW HASH FUNCTIONS AND THEIR USE IN AUTHENTICATION AND SET EQUALITY [J].
WEGMAN, MN ;
CARTER, JL .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1981, 22 (03) :265-279