CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"

被引:5
|
作者
Lin Ching-Ying [1 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
关键词
quantum asymmetric cryptography; symmetric key; CNOT extraction attack;
D O I
10.1007/s11433-013-5290-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys. This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT (CNOT) extraction attack. A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.
引用
收藏
页码:1001 / 1003
页数:3
相关论文
共 50 条
  • [21] SYMMETRIC AND ASYMMETRIC QUANTUM CODES
    Guenda, Kenza
    Gulliver, T. Aaron
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2013, 11 (05)
  • [22] Cryptanalysis on quantum digital signature based on asymmetric quantum cryptography
    Shi, Wei-Min
    Wang, Yan-Mei
    Zhou, Yi-Hua
    Yang, Yu-Guang
    OPTIK, 2018, 154 : 258 - 260
  • [23] CNOT CIRCUIT EXTRACTION FOR TOPOLOGICALLY-CONSTRAINED QUANTUM MEMORIES
    Kissinger, Aleks
    Meijer-Van de Griend, Arianne
    QUANTUM INFORMATION & COMPUTATION, 2020, 20 (7-8) : 581 - 596
  • [24] Secure Data Transfer in MANET Using Symmetric and Asymmetric Cryptography
    Kapur, Raj Kamal
    Khatri, Sunil Kumar
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [25] Attack trees in Isabelle extended with probabilities for quantum cryptography
    Kammueller, Florian
    COMPUTERS & SECURITY, 2019, 87
  • [26] A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys
    Ioannou, Lawrence M.
    Mosca, Michele
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 255 - 274
  • [27] On a collective attack on the key in quantum cryptography on two nonorthogonal states
    Molotkov, SN
    JETP LETTERS, 2004, 80 (08) : 563 - 567
  • [28] Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography
    Roy, Tumpa
    Dutta, Kamlesh
    TRENDS IN NETWORKS AND COMMUNICATIONS, 2011, 197 : 88 - 99
  • [29] USING SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY TO SECURE COMMUNICATION BETWEEN DEVICES IN IoT
    Henriques, Michelle S.
    Vernekar, Nagaraj K.
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [30] Unambiguous measurements and Trojan-horse attack in quantum cryptography
    Molotkov, S. N.
    LASER PHYSICS LETTERS, 2020, 17 (01)