Attacks on quantum key distribution protocols that employ non-ITS authentication
DOI10.1007/S11128-015-1160-4zbMATH Open1333.81124DBLPjournals/qip/PacherALPUZL16arXiv1209.0365OpenAlexW1517334679WikidataQ62114569 ScholiaQ62114569MaRDI QIDQ265393FDOQ265393
Authors: C. Pacher, A. Abidin, T. Lorünser, M. Peev, R. Ursin, Anton Zeilinger, Jan-Åke Larsson
Publication date: 4 April 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1209.0365
Recommendations
- Security Aspects of the Authentication Used in Quantum Cryptography
- Cryptanalysis of a practical quantum key distribution with polarization-entangled photons
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Direct proof of security of Wegman-Carter authentication with partially known key
- Attack strategies on QKD protocols
collision attacksinformation-theoretic securityman-in-the-middle attackmessage authenticationquantum key distribution
Cites Work
- Probability Inequalities for Sums of Bounded Random Variables
- Title not available (Why is that?)
- Quantum cryptography: public key distribution and coin tossing
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Universal hashing and geometric codes
- Experimental quantum cryptography.
- New Universal Hash Functions
- Key Recycling in Authentication
- RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'"
- Vulnerability of ``a novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- Cryptanalysis of a practical quantum key distribution with polarization-entangled photons
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Title not available (Why is that?)
- Title not available (Why is that?)
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Theory of Cryptography
- Theory of Cryptography
- Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories
Cited In (15)
- Attacks on beyond-birthday-bound MACs in the quantum setting
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- A note on quantum related-key attacks
- Title not available (Why is that?)
- Frequency shift attack on ‘plug-and-play’ quantum key distribution systems
- Direct proof of security of Wegman-Carter authentication with partially known key
- Sifting attacks in finite-size quantum key distribution
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Title not available (Why is that?)
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Detecting relay attacks on RFID communication systems using quantum bits
- Cryptanalysis and improvement of a quantum private set intersection protocol
- Quantum attacks on beyond-birthday-bound MACs
- Cascading attack on trusted-relay quantum key distribution networks
This page was built for publication: Attacks on quantum key distribution protocols that employ non-ITS authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q265393)