Security Aspects of the Authentication Used in Quantum Cryptography
From MaRDI portal
Publication:3604644
DOI10.1109/TIT.2008.917697zbMATH Open1330.94054arXivquant-ph/0611009OpenAlexW2160213462MaRDI QIDQ3604644FDOQ3604644
Authors: Jorgen Cederlof, Jan-Åke Larsson
Publication date: 24 February 2009
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Abstract: Unconditionally secure message authentication is an important part of quantum cryptography (QC). In this correspondence, we analyze security effects of using a key obtained from QC for authentication purposes in later rounds of QC. In particular, the eavesdropper gains partial knowledge on the key in QC that may have an effect on the security of the authentication in the later round. Our initial analysis indicates that this partial knowledge has little effect on the authentication part of the system, in agreement with previous results on the issue. However, when taking the full QC protocol into account, the picture is different. By accessing the quantum channel used in QC, the attacker can change the message to be authenticated. This, together with partial knowledge of the key, does incur a security weakness of the authentication. The underlying reason for this is that the authentication used, which is insensitive to such message changes when the key is unknown, becomes sensitive when used with a partially known key. We suggest a simple solution to this problem, and stress usage of this or an equivalent extra security measure in QC.
Full work available at URL: https://arxiv.org/abs/quant-ph/0611009
Recommendations
- Quantum authentication with key recycling
- Qubit authentication
- Study on the security of the authentication scheme with key recycling in QKD
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Cryptanalysis of a practical quantum key distribution with polarization-entangled photons
Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cited In (14)
- Qubit authentication
- Modeling and simulation of practical quantum secure communication network
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Improving classical authentication over a quantum channel
- Quantum randomness: from practice to theory and back
- Title not available (Why is that?)
- Cryptanalysis of a practical quantum key distribution with polarization-entangled photons
- Quantum Bell states-based anonymous voting with anonymity trace
- Study on the security of the authentication scheme with key recycling in QKD
- Direct proof of security of Wegman-Carter authentication with partially known key
- Title not available (Why is that?)
- Implementation of quantum key distribution network simulation module in the network simulator NS-3
- An optimized quantum information splitting scheme with multiple controllers
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
This page was built for publication: Security Aspects of the Authentication Used in Quantum Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604644)