Cryptanalysis of limited resource semi-quantum secret sharing

被引:0
作者
Chia-Wei Tsai
Yao-Chung Chang
Ying-Hsun Lai
Chun-Wei Yang
机构
[1] National Taitung University,Department of Computer Science and Information Engineering
[2] China Medical University,Center for General Education and College of Humanities and Sciences
来源
Quantum Information Processing | 2020年 / 19卷
关键词
Semi-quantum; Quantum secret sharing protocol; CNOT attack;
D O I
暂无
中图分类号
学科分类号
摘要
Li et al. (Quantum Inf Process 17(10):285, 2018) proposed a limited resource semi-quantum secret sharing protocol, in which the classical participants do not equip any quantum measurement devices. However, this protocol has a security loophole. This study investigates this loophole and indicates that a malicious agent can perform the double-CNOT attack to steal partial information about the secret shadow of the other agent without being detected.
引用
收藏
相关论文
共 46 条
  • [1] Shamir A(1979)How to share a secret Commun. ACM 22 612-undefined
  • [2] Hillery M(1999)Quantum secret sharing Phys. Rev. A 59 1829-undefined
  • [3] Bužek V(2007)Quantum key distribution with classical Bob Phys. Rev. A 99 140501-undefined
  • [4] Berthiaume A(2018)Limited resource semiquantum secret sharing Quantum Inf. Process. 17 285-undefined
  • [5] Boyer M(2020)Semi-quantum cryptography Quantum Inf. Process. 19 97-undefined
  • [6] Kenigsberg D(2003)Eavesdropping on the ‘ping–pong’ quantum communication protocol Phys. Rev. Lett. 90 157901-undefined
  • [7] Mor T(2004)Improving Wójcik’s eavesdropping attack on the ping–pong protocol Phys. Lett. A 333 46-undefined
  • [8] Li ZL(2011)Eavesdropping on the quantum dialogue protocol in lossy channel Chin. Phys. B 20 070305-undefined
  • [9] Li Q(2007)Comment on: ‘Quantum exam’ Phys. Lett. A 360 748-undefined
  • [10] Liu CD(2006)Deterministic six states protocol for quantum communication Phys. Lett. A 358 85-undefined