Cargando…
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “class...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7513060/ https://www.ncbi.nlm.nih.gov/pubmed/33265625 http://dx.doi.org/10.3390/e20070536 |
_version_ | 1783586300787425280 |
---|---|
author | Boyer, Michel Liss, Rotem Mor, Tal |
author_facet | Boyer, Michel Liss, Rotem Mor, Tal |
author_sort | Boyer, Michel |
collection | PubMed |
description | A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “classical Alice with a controllable mirror” (the “Mirror protocol”), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the “simplified Mirror protocol”) to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness. |
format | Online Article Text |
id | pubmed-7513060 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75130602020-11-09 Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Boyer, Michel Liss, Rotem Mor, Tal Entropy (Basel) Article A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “classical Alice with a controllable mirror” (the “Mirror protocol”), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the “simplified Mirror protocol”) to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness. MDPI 2018-07-18 /pmc/articles/PMC7513060/ /pubmed/33265625 http://dx.doi.org/10.3390/e20070536 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Boyer, Michel Liss, Rotem Mor, Tal Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol |
title | Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol |
title_full | Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol |
title_fullStr | Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol |
title_full_unstemmed | Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol |
title_short | Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol |
title_sort | attacks against a simplified experimentally feasible semiquantum key distribution protocol |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7513060/ https://www.ncbi.nlm.nih.gov/pubmed/33265625 http://dx.doi.org/10.3390/e20070536 |
work_keys_str_mv | AT boyermichel attacksagainstasimplifiedexperimentallyfeasiblesemiquantumkeydistributionprotocol AT lissrotem attacksagainstasimplifiedexperimentallyfeasiblesemiquantumkeydistributionprotocol AT mortal attacksagainstasimplifiedexperimentallyfeasiblesemiquantumkeydistributionprotocol |