Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Quantum cryptography and authentication with low key-consumption
Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.
Austrian Institute of Technology, Austria.
Austrian Institute of Technology, Austria.
Linköping University, Department of Electrical Engineering, Information Coding. Linköping University, The Institute of Technology.ORCID iD: 0000-0002-1082-8325
Show others and affiliations
2011 (English)In: Proceedings of SPIE - The International Society for Optical Engineering, 2011, p. 818916-Conference paper, Published paper (Refereed)
Abstract [en]

Quantum Key Distribution (QKD - also referred to as Quantum Cryptography) is a technique for secret key agreement. It has been shown that QKD rigged with Information-Theoretic Secure (ITS) authentication (using secret key) of the classical messages transmitted during the key distribution protocol is also ITS. Note, QKD without any authentication can trivially be broken by man-in-the-middle attacks. Here, we study an authentication method that was originally proposed because of its low key consumption; a two-step authentication that uses a publicly known hash function, followed by a secret strongly universal2 hash function, which is exchanged each round. This two-step authentication is not information-theoretically secure but it was argued that nevertheless it does not compromise the security of QKD. In the current contribution we study intrinsic weaknesses of this approach under the common assumption that the QKD adversary has access to unlimited resources including quantum memories. We consider one implementation of Quantum Cryptographic protocols that use such authentication and demonstrate an attack that fully extract the secret key. Even including the final key from the protocol in the authentication does not rule out the possibility of these attacks. To rectify the situation, we propose a countermeasure that, while not informationtheoretically secure, restores the need for very large computing power for the attack to work. Finally, we specify conditions that must be satisfied by the two-step authentication in order to restore informationtheoretic security.

Place, publisher, year, edition, pages
2011. p. 818916-
Series
Proceedings of SPIE, ISSN 0277-786X ; 8189
National Category
Other Physics Topics
Identifiers
URN: urn:nbn:se:liu:diva-76601DOI: 10.1117/12.898344ISBN: 978-081948817-6 (print)OAI: oai:DiVA.org:liu-76601DiVA, id: diva2:515405
Conference
Quantum-Physics-Based Information Security, Prague, 19-21 September 2011
Projects
ICG QCAvailable from: 2012-04-12 Created: 2012-04-12 Last updated: 2016-09-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Search in DiVA

By author/editor
Abidin, AysajanLarsson, Jan-Åke
By organisation
Information CodingThe Institute of Technology
Other Physics Topics

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 1557 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf