Cargando…

Measurement-Device-Independent Two-Party Cryptography with Error Estimation

We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions throu...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhou, Zishuai, Guang, Qisheng, Gao, Chaohui, Jiang, Dong, Chen, Lijun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7664419/
https://www.ncbi.nlm.nih.gov/pubmed/33171748
http://dx.doi.org/10.3390/s20216351
_version_ 1783609843449331712
author Zhou, Zishuai
Guang, Qisheng
Gao, Chaohui
Jiang, Dong
Chen, Lijun
author_facet Zhou, Zishuai
Guang, Qisheng
Gao, Chaohui
Jiang, Dong
Chen, Lijun
author_sort Zhou, Zishuai
collection PubMed
description We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification.
format Online
Article
Text
id pubmed-7664419
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-76644192020-11-14 Measurement-Device-Independent Two-Party Cryptography with Error Estimation Zhou, Zishuai Guang, Qisheng Gao, Chaohui Jiang, Dong Chen, Lijun Sensors (Basel) Article We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited power and catches the attacking actions through highly estimated bit error rate. Our protocol is formally proved to be secure against both eavesdroppers and dishonest communication parties. We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification. MDPI 2020-11-07 /pmc/articles/PMC7664419/ /pubmed/33171748 http://dx.doi.org/10.3390/s20216351 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhou, Zishuai
Guang, Qisheng
Gao, Chaohui
Jiang, Dong
Chen, Lijun
Measurement-Device-Independent Two-Party Cryptography with Error Estimation
title Measurement-Device-Independent Two-Party Cryptography with Error Estimation
title_full Measurement-Device-Independent Two-Party Cryptography with Error Estimation
title_fullStr Measurement-Device-Independent Two-Party Cryptography with Error Estimation
title_full_unstemmed Measurement-Device-Independent Two-Party Cryptography with Error Estimation
title_short Measurement-Device-Independent Two-Party Cryptography with Error Estimation
title_sort measurement-device-independent two-party cryptography with error estimation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7664419/
https://www.ncbi.nlm.nih.gov/pubmed/33171748
http://dx.doi.org/10.3390/s20216351
work_keys_str_mv AT zhouzishuai measurementdeviceindependenttwopartycryptographywitherrorestimation
AT guangqisheng measurementdeviceindependenttwopartycryptographywitherrorestimation
AT gaochaohui measurementdeviceindependenttwopartycryptographywitherrorestimation
AT jiangdong measurementdeviceindependenttwopartycryptographywitherrorestimation
AT chenlijun measurementdeviceindependenttwopartycryptographywitherrorestimation