DeepAI AI Chat
Log In Sign Up

Concerning Quantum Identification Without Entanglement

by   González-Guillén, et al.
Universidad Politécnica de Madrid
Universidad Rey Juan Carlos
Florida Atlantic University

Identification schemes are interactive protocols typically involving two parties, a prover, who wants to provide evidence of his or her identity and a verifier, who checks the provided evidence and decide whether it comes or not from the intended prover. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki, and give a concrete attack upholding theoretical impossibility results from Lo and Buhrman et al. More precisely, we show that using a simple strategyan adversary may indeed obtain non-negligible information on the shared identification secret. While the security of a quantum identity authentication scheme is not formally defined in [1], it is clear that such a definition should somehow imply that an external entity may gain no information on the shared identification scheme (even if he actively participates injecting messages in a protocol execution, which is not assumed in our attack strategy).


page 1

page 2

page 3

page 4


A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

Secure communication has achieved a new dimension with the advent of the...

Client-Server Identification Protocols with Quantum PUF

Recently, major progress has been made towards the realisation of the qu...

A^2RID – Anonymous Direct Authentication and Remote Identification of Commercial Drones

The recent worldwide introduction of RemoteID (RID) regulations forces a...

Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy for secret reconstruction

The work presents a novel quantum secret sharing strategy based on GHZ p...

Remote quantum-safe authentication of entities with physical unclonable functions

Physical unclonable functions have been shown a useful resource of rando...

Why the Equifax Breach Should Not Have Mattered

Data security, which is concerned with the prevention of unauthorized ac...