CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”

被引:0
|
作者
LIN Ching-Ying [1 ]
HWANG Tzonelih [1 ]
机构
[1] Department of Computer Science and Information Engineering,National Cheng Kung University
关键词
quantum asymmetric cryptography; symmetric key; CNOT extraction attack;
D O I
暂无
中图分类号
O413 [量子论]; TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT(CNOT)extraction attack.A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.
引用
收藏
页码:1001 / 1003
页数:3
相关论文
共 50 条
  • [1] CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"
    Lin Ching-Ying
    Hwang, Tzonelih
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2014, 57 (05) : 1001 - 1003
  • [2] CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”
    Ching-Ying Lin
    Tzonelih Hwang
    Science China Physics, Mechanics & Astronomy, 2014, 57 : 1001 - 1003
  • [3] Quantum asymmetric cryptography with symmetric keys
    Fei Gao
    QiaoYan Wen
    SuJuan Qin
    FuChen Zhu
    Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52 : 1925 - 1931
  • [4] Quantum asymmetric cryptography with symmetric keys
    Gao Fei
    Wen QiaoYan
    Qin SuJuan
    Zhu FuChen
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (12): : 1925 - 1931
  • [5] Asymmetric cryptography with physical unclonable keys
    Uppu, Ravitej
    Wolterink, Tom A. W.
    Goorden, Sebastianus A.
    Chen, Bin
    Skoric, Boris
    Mosk, Allard P.
    Pinkse, Pepijn W. H.
    QUANTUM SCIENCE AND TECHNOLOGY, 2019, 4 (04)
  • [6] Quantum entanglement and composite keys in quantum cryptography
    Molotkov, S. N.
    JETP LETTERS, 2017, 105 (12) : 801 - 805
  • [7] Quantum entanglement and composite keys in quantum cryptography
    S. N. Molotkov
    JETP Letters, 2017, 105 : 801 - 805
  • [8] On the complexity of search for keys in quantum cryptography
    S. N. Molotkov
    JETP Letters, 2016, 103 : 345 - 349
  • [9] On the complexity of search for keys in quantum cryptography
    Molotkov, S. N.
    JETP LETTERS, 2016, 103 (05) : 345 - 349
  • [10] Multilayer symmetric and asymmetric technique for audiovisual cryptography
    Parekh, Aryan
    Antani, Mayav
    Suvarna, Kartik
    Mangrulkar, Ramchandra
    Narvekar, Meera
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 31465 - 31503