DeepAI AI Chat
Log In Sign Up

Concerning Quantum Identification Without Entanglement

03/26/2020
by   González-Guillén, et al.
Universidad Politécnica de Madrid
Universidad Rey Juan Carlos
Florida Atlantic University
0

Identification schemes are interactive protocols typically involving two parties, a prover, who wants to provide evidence of his or her identity and a verifier, who checks the provided evidence and decide whether it comes or not from the intended prover. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki, and give a concrete attack upholding theoretical impossibility results from Lo and Buhrman et al. More precisely, we show that using a simple strategyan adversary may indeed obtain non-negligible information on the shared identification secret. While the security of a quantum identity authentication scheme is not formally defined in [1], it is clear that such a definition should somehow imply that an external entity may gain no information on the shared identification scheme (even if he actively participates injecting messages in a protocol execution, which is not assumed in our attack strategy).

READ FULL TEXT

page 1

page 2

page 3

page 4

12/08/2021

A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

Secure communication has achieved a new dimension with the advent of the...
06/08/2020

Client-Server Identification Protocols with Quantum PUF

Recently, major progress has been made towards the realisation of the qu...
10/21/2022

A^2RID – Anonymous Direct Authentication and Remote Identification of Commercial Drones

The recent worldwide introduction of RemoteID (RID) regulations forces a...
02/21/2020

Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy for secret reconstruction

The work presents a novel quantum secret sharing strategy based on GHZ p...
08/01/2021

Remote quantum-safe authentication of entities with physical unclonable functions

Physical unclonable functions have been shown a useful resource of rando...
12/30/2017

Why the Equifax Breach Should Not Have Mattered

Data security, which is concerned with the prevention of unauthorized ac...