Cargando…

An Attack on Zawadzki’s Quantum Authentication Scheme

Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...

Descripción completa

Detalles Bibliográficos
Autores principales: González-Guillén, Carlos E., González Vasco, María Isabel, Johnson, Floyd, Pérez del Pozo, Ángel L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/
https://www.ncbi.nlm.nih.gov/pubmed/33805925
http://dx.doi.org/10.3390/e23040389
_version_ 1783682122597269504
author González-Guillén, Carlos E.
González Vasco, María Isabel
Johnson, Floyd
Pérez del Pozo, Ángel L.
author_facet González-Guillén, Carlos E.
González Vasco, María Isabel
Johnson, Floyd
Pérez del Pozo, Ángel L.
author_sort González-Guillén, Carlos E.
collection PubMed
description Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts.
format Online
Article
Text
id pubmed-8064377
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-80643772021-04-24 An Attack on Zawadzki’s Quantum Authentication Scheme González-Guillén, Carlos E. González Vasco, María Isabel Johnson, Floyd Pérez del Pozo, Ángel L. Entropy (Basel) Article Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts. MDPI 2021-03-25 /pmc/articles/PMC8064377/ /pubmed/33805925 http://dx.doi.org/10.3390/e23040389 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) ).
spellingShingle Article
González-Guillén, Carlos E.
González Vasco, María Isabel
Johnson, Floyd
Pérez del Pozo, Ángel L.
An Attack on Zawadzki’s Quantum Authentication Scheme
title An Attack on Zawadzki’s Quantum Authentication Scheme
title_full An Attack on Zawadzki’s Quantum Authentication Scheme
title_fullStr An Attack on Zawadzki’s Quantum Authentication Scheme
title_full_unstemmed An Attack on Zawadzki’s Quantum Authentication Scheme
title_short An Attack on Zawadzki’s Quantum Authentication Scheme
title_sort attack on zawadzki’s quantum authentication scheme
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/
https://www.ncbi.nlm.nih.gov/pubmed/33805925
http://dx.doi.org/10.3390/e23040389
work_keys_str_mv AT gonzalezguillencarlose anattackonzawadzkisquantumauthenticationscheme
AT gonzalezvascomariaisabel anattackonzawadzkisquantumauthenticationscheme
AT johnsonfloyd anattackonzawadzkisquantumauthenticationscheme
AT perezdelpozoangell anattackonzawadzkisquantumauthenticationscheme
AT gonzalezguillencarlose attackonzawadzkisquantumauthenticationscheme
AT gonzalezvascomariaisabel attackonzawadzkisquantumauthenticationscheme
AT johnsonfloyd attackonzawadzkisquantumauthenticationscheme
AT perezdelpozoangell attackonzawadzkisquantumauthenticationscheme