It Does Not Follow. Response to "Yes They Can! ..."

11/15/2018
by   Mladen Pavicic, et al.
0

This a response to "Yes They Can! ..." (a comment on [5]) by J.S. Shaari et al. [9]. We show that the claims in the comment do not hold up and that all the conclusions obtained in [5] are correct. In particular, the two considered kinds of two-way communication protocols (ping-pong and LM05) under a quantum-man-in-the-middle (QMM) attack have neither a critical disturbance (D), nor a valid privacy amplification (PA) procedure, nor an unconditional security proof. However, we point out that there is another two-way protocol which does have a critical D and a valid PA and which is resistant to a QMM attack.

READ FULL TEXT

page 1

page 2

page 3

research
06/20/2020

Measure-resend authenticated semi-quantum key distribution with single photons

Yu et al. and Li et al. have proposed the measure-resend protocols of au...
research
06/09/2020

Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption"

Recently in 2018, Niu et al. proposed a measurement-device-independent q...
research
07/25/2019

Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT

By expanding the connection of objects to the Internet and their entry t...
research
06/23/2023

Valid inference after prediction

Recent work has focused on the very common practice of prediction-based ...
research
08/13/2021

Quantum and semi-quantum sealed-bid auction: Vulnerabilities and advantages

A family of existing protocols for quantum sealed-bid auction is critica...
research
12/15/2021

00

What is the funniest number in cryptography (Episode 2)? 0 [1]. The reas...
research
07/02/2018

Well-Scaling Procedure for Deciding Gammoid Class-Membership of Matroids

We introduce a procedure that solves the decision problem whether a give...

Please sign up or login with your details

Forgot password? Click here to reset