Cargando…
An Attack on Zawadzki’s Quantum Authentication Scheme
Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quant...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/ https://www.ncbi.nlm.nih.gov/pubmed/33805925 http://dx.doi.org/10.3390/e23040389 |
_version_ | 1783682122597269504 |
---|---|
author | González-Guillén, Carlos E. González Vasco, María Isabel Johnson, Floyd Pérez del Pozo, Ángel L. |
author_facet | González-Guillén, Carlos E. González Vasco, María Isabel Johnson, Floyd Pérez del Pozo, Ángel L. |
author_sort | González-Guillén, Carlos E. |
collection | PubMed |
description | Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts. |
format | Online Article Text |
id | pubmed-8064377 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-80643772021-04-24 An Attack on Zawadzki’s Quantum Authentication Scheme González-Guillén, Carlos E. González Vasco, María Isabel Johnson, Floyd Pérez del Pozo, Ángel L. Entropy (Basel) Article Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts. MDPI 2021-03-25 /pmc/articles/PMC8064377/ /pubmed/33805925 http://dx.doi.org/10.3390/e23040389 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) ). |
spellingShingle | Article González-Guillén, Carlos E. González Vasco, María Isabel Johnson, Floyd Pérez del Pozo, Ángel L. An Attack on Zawadzki’s Quantum Authentication Scheme |
title | An Attack on Zawadzki’s Quantum Authentication Scheme |
title_full | An Attack on Zawadzki’s Quantum Authentication Scheme |
title_fullStr | An Attack on Zawadzki’s Quantum Authentication Scheme |
title_full_unstemmed | An Attack on Zawadzki’s Quantum Authentication Scheme |
title_short | An Attack on Zawadzki’s Quantum Authentication Scheme |
title_sort | attack on zawadzki’s quantum authentication scheme |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8064377/ https://www.ncbi.nlm.nih.gov/pubmed/33805925 http://dx.doi.org/10.3390/e23040389 |
work_keys_str_mv | AT gonzalezguillencarlose anattackonzawadzkisquantumauthenticationscheme AT gonzalezvascomariaisabel anattackonzawadzkisquantumauthenticationscheme AT johnsonfloyd anattackonzawadzkisquantumauthenticationscheme AT perezdelpozoangell anattackonzawadzkisquantumauthenticationscheme AT gonzalezguillencarlose attackonzawadzkisquantumauthenticationscheme AT gonzalezvascomariaisabel attackonzawadzkisquantumauthenticationscheme AT johnsonfloyd attackonzawadzkisquantumauthenticationscheme AT perezdelpozoangell attackonzawadzkisquantumauthenticationscheme |