Cargando…

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “class...

Descripción completa

Detalles Bibliográficos
Autores principales: Boyer, Michel, Liss, Rotem, Mor, Tal
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7513060/
https://www.ncbi.nlm.nih.gov/pubmed/33265625
http://dx.doi.org/10.3390/e20070536
_version_ 1783586300787425280
author Boyer, Michel
Liss, Rotem
Mor, Tal
author_facet Boyer, Michel
Liss, Rotem
Mor, Tal
author_sort Boyer, Michel
collection PubMed
description A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “classical Alice with a controllable mirror” (the “Mirror protocol”), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the “simplified Mirror protocol”) to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness.
format Online
Article
Text
id pubmed-7513060
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75130602020-11-09 Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Boyer, Michel Liss, Rotem Mor, Tal Entropy (Basel) Article A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “classical Alice with a controllable mirror” (the “Mirror protocol”), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the “simplified Mirror protocol”) to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness. MDPI 2018-07-18 /pmc/articles/PMC7513060/ /pubmed/33265625 http://dx.doi.org/10.3390/e20070536 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Boyer, Michel
Liss, Rotem
Mor, Tal
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
title Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
title_full Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
title_fullStr Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
title_full_unstemmed Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
title_short Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
title_sort attacks against a simplified experimentally feasible semiquantum key distribution protocol
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7513060/
https://www.ncbi.nlm.nih.gov/pubmed/33265625
http://dx.doi.org/10.3390/e20070536
work_keys_str_mv AT boyermichel attacksagainstasimplifiedexperimentallyfeasiblesemiquantumkeydistributionprotocol
AT lissrotem attacksagainstasimplifiedexperimentallyfeasiblesemiquantumkeydistributionprotocol
AT mortal attacksagainstasimplifiedexperimentallyfeasiblesemiquantumkeydistributionprotocol