DeepAI AI Chat
Log In Sign Up

It Does Not Follow. Response to "Yes They Can! ..."

by   Mladen Pavicic, et al.
Ruđer Bošković Institute

This a response to "Yes They Can! ..." (a comment on [5]) by J.S. Shaari et al. [9]. We show that the claims in the comment do not hold up and that all the conclusions obtained in [5] are correct. In particular, the two considered kinds of two-way communication protocols (ping-pong and LM05) under a quantum-man-in-the-middle (QMM) attack have neither a critical disturbance (D), nor a valid privacy amplification (PA) procedure, nor an unconditional security proof. However, we point out that there is another two-way protocol which does have a critical D and a valid PA and which is resistant to a QMM attack.


page 1

page 2

page 3


Measure-resend authenticated semi-quantum key distribution with single photons

Yu et al. and Li et al. have proposed the measure-resend protocols of au...

Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption"

Recently in 2018, Niu et al. proposed a measurement-device-independent q...

Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT

By expanding the connection of objects to the Internet and their entry t...

Quantum and semi-quantum sealed-bid auction: Vulnerabilities and advantages

A family of existing protocols for quantum sealed-bid auction is critica...


What is the funniest number in cryptography (Episode 2)? 0 [1]. The reas...

Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states

Recently, Li et al. (Int J Theor Phys: DOI: 10.1007/s10773-020-04588-w, ...