scholarly journals Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 518 ◽  
Author(s):  
Bin Liu ◽  
Zhifeng Gao ◽  
Di Xiao ◽  
Wei Huang ◽  
Zhiqing Zhang ◽  
...  

In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.

2021 ◽  
Vol 53 (6) ◽  
Author(s):  
Xiaobo Zheng ◽  
Zhiwen Zhao

AbstractQuantum key distribution uses the principle of quantum physics to realize unconditionally secure key distribution protocol. But this kind of security needs to be based on the authenticated classical channel. Although there are quantum key distribution protocols without classical channel, authentication is still needed. In the process of key distribution, authentication is not considered, which is also a problem of quantum key distribution protocol. In this paper, a quantum key distribution protocol with two-way authentication is proposed. Identity authentication is carried out at the same time of key distribution. If the identity authentication fails, the key distribution protocol cannot be carried out. If the key distribution protocol is aborted, the identity authentication is not successful. The conclusion of this paper is based on a central authentication system supported by symmetric encryption theory, which uses pseudo-random functions, multiple sets of quantum conjugate bases and Measurement-device-independent technology to simultaneously achieve two-way authentication and key distribution.


2019 ◽  
Vol 9 (1) ◽  
pp. 50-58 ◽  
Author(s):  
A. P. Pljonkin

A typical structure of an auto-compensation system for quantum key distribution is given. The principle of operation of a fiber-optic system for the distribution of quantum keys with phase coding of photon states is described. The operation of the system in the synchronization mode and the formation of quantum keys was investigated. The process of detecting a time interval with an optical synchronization pulse is analyzed. The structural scheme of the experimental stand of the quantum-cryptographic network is given. Data are obtained that attest to the presence of a multiphoton signal during the transmission of sync pulses from the transceiver station to the coding and backward direction. The results of experimental studies are presented, which prove the existence of a vulnerability in the process of synchronization of the quantum key distribution system. It is shown that the use of a multiphoton optical pulse as a sync signal makes it possible for an attacker to unauthorized access to a quantum communication channel. The experimental results show that tapping a portion of the optical power from the quantum communication channel during the synchronization process allows an attacker to remain unnoticed while the quantum protocol is operating. Experimentally proved the possibility of introducing malfunctions into the operation of the quantum communication system at the stage of key formation, while remaining invisible for control means.


Author(s):  
A. P. Pljonkin

A typical structure of an auto-compensation system for quantum key distribution is given. The principle of operation of a fiber-optic system for the distribution of quantum keys with phase coding of photon states is described. The operation of the system in the synchronization mode and the formation of quantum keys was investigated. The process of detecting a time interval with an optical synchronization pulse is analyzed. The structural scheme of the experimental stand of the quantum-cryptographic network is given. Data are obtained that attest to the presence of a multiphoton signal during the transmission of sync pulses from the transceiver station to the coding and backward direction. The results of experimental studies are presented, which prove the existence of a vulnerability in the process of synchronization of the quantum key distribution system. It is shown that the use of a multiphoton optical pulse as a sync signal makes it possible for an attacker to unauthorized access to a quantum communication channel. The experimental results show that tapping a portion of the optical power from the quantum communication channel during the synchronization process allows an attacker to remain unnoticed while the quantum protocol is operating. Experimentally proved the possibility of introducing malfunctions into the operation of the quantum communication system at the stage of key formation, while remaining invisible for control means.


2014 ◽  
Vol 945-949 ◽  
pp. 2277-2283 ◽  
Author(s):  
Tao Yu ◽  
Hui Yao An ◽  
Dun Wei Liu

It is known that practical quantum key distribution system, because of the imperfect of devices, has sort of loopholes, so Eve can attack through these loopholes. The proposition of measurement device independent quantum key distribution protocol claimed to solve all the loopholes at the detector side. However the proof of MDI-QKD is based on the Hong-Ou-Mandel effect at 50:50 beam splitter. And with current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, the author propose a wavelength-dependent attacking protocol, which can be applied to practical MDI-QKD systems. Through this attacking protocol the author theoretical estimated that the eavesdropper could get 70% of the encoding information with a QBER of only 0.04.


2011 ◽  
Vol 09 (06) ◽  
pp. 1427-1435 ◽  
Author(s):  
TAKAYUKI MIYADERA

The "semiquantum" key distribution protocol introduced by Zou et al. is examined. The protocol while using two-way quantum communication requires only Bob to be fully quantum. We derive a trade-off inequality between information gained by Eve and the disturbance observed by legitimate users. It guarantees that Eve cannot obtain large information if the disturbance is sufficiently small.


Sign in / Sign up

Export Citation Format

Share Document