Improvement on “Quantum Key Agreement Protocol with Maximally Entangled States”

被引:0
作者
Song-Kong Chong
Chia-Wei Tsai
Tzonelih Hwang
机构
[1] National Cheng Kung University,Department of Computer Science and Information Engineering
来源
International Journal of Theoretical Physics | 2011年 / 50卷
关键词
Quantum cryptography; Quantum key agreement; Maximally entangled states;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236–242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.’s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210–213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.
引用
收藏
页码:1793 / 1802
页数:9
相关论文
共 26 条
  • [1] Zhou N.(2004)Quantum key agreement protocol Electron. Lett. 40 1149-1150
  • [2] Zeng G.(2010)Quantum key agreement protocol based on BB84 Opt. Commun. 283 1192-1195
  • [3] Xiong J.(1992)Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 68 3121-3124
  • [4] Chong S.K.(1991)Quantum cryptography based on Bell’s theorem Phys. Rev. Lett. 67 661-663
  • [5] Hwang T.(2006)Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection Phys. Rev. A 74 43-45
  • [6] Bennett C.H.(2007)EPR quantum key distribution protocols with potential 100% qubit efficiency IET Proc. Inf. Secur. 1 71-80
  • [7] Ekert A.K.(2007)Provably secure three-party authenticated quantum key distribution protocols IEEE Trans. Dependable Secure Comput. 4 23-25
  • [8] Namiki R.(2006)Eavesdropping on the two-way quantum communication protocols with invisible photons Mod. Phys. Lett. A 351 1531-1535
  • [9] Hirono T.(2009)The enhancement of Zhou et al.’s quantum secret sharing protocol Int. J. Mod. Phys. A 20 1602-1609
  • [10] Hwang T.(2009)New efficient three-party quantum key distribution protocols IEEE J. Sel. Top. Quantum Electron. 15 893-895