Quantum cloning attacks against PUF-based quantum authentication systems
From MaRDI portal
Publication:331906
DOI10.1007/s11128-016-1316-xzbMath1348.81216arXiv1605.00786OpenAlexW2346773682MaRDI QIDQ331906
Ming Gao, Mo Li, Yao Yao, Jian Zhang
Publication date: 27 October 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1605.00786
Cryptography (94A60) Quantum state estimation, approximate cloning (81P50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Quantum private comparison protocol based on the entanglement swapping between \(\chi ^+\) state and W-class state ⋮ Comment on ``A novel quantum deniable authentication protocol without entanglement ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Induced measures in the space of mixed quantum states
- SECURITY OF QUANTUM-READOUT PUFs AGAINST QUADRATURE-BASED CHALLENGE-ESTIMATION ATTACKS
- Physically Unclonable Functions
- Quantum readout of Physical Unclonable Functions
- Quantum cloning
- Optimal cloning of pure states, testing single clones
- Universal Algorithm for Optimal Estimation of Quantum States from Finite Ensembles via Realizable Generalized Measurement
- Quantum Cryptography with 3-State Systems
- Geometry of Quantum States
This page was built for publication: Quantum cloning attacks against PUF-based quantum authentication systems