Quantum cloning attacks against PUF-based quantum authentication systems
From MaRDI portal
Publication:331906
DOI10.1007/S11128-016-1316-XzbMATH Open1348.81216arXiv1605.00786OpenAlexW2346773682MaRDI QIDQ331906FDOQ331906
Authors: Yao Yao, Ming Gao, Mo Li, Jian Zhang
Publication date: 27 October 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Abstract: With the advent of Physical Unclonable Functions (PUFs), PUF-based quantum authentication systems (QAS) have been proposed for security purposes and recently proof-of-principle experiment has been demonstrated. As a further step towards completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution (QKD) protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.
Full work available at URL: https://arxiv.org/abs/1605.00786
Recommendations
Cryptography (94A60) Quantum state estimation, approximate cloning (81P50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Quantum cloning
- Quantum cryptography with 3-state systems
- Induced measures in the space of mixed quantum states
- Universal Algorithm for Optimal Estimation of Quantum States from Finite Ensembles via Realizable Generalized Measurement
- Security of quantum-readout PUFs against quadrature-based challenge-estimation attacks
- Physically unclonable functions. Constructions, properties and applications
- Quantum readout of physical unclonable functions
- Optimal cloning of pure states, testing single clones
- Geometry of Quantum States
Cited In (6)
- A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
- Comment on ``A novel quantum deniable authentication protocol without entanglement
- Security of quantum-readout PUFs against quadrature-based challenge-estimation attacks
- Quantum readout of physical unclonable functions
- Quantum private comparison protocol based on the entanglement swapping between \(\chi ^+\) state and W-class state
- Authenticated communication from quantum readout of pufs
This page was built for publication: Quantum cloning attacks against PUF-based quantum authentication systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q331906)