Semi-Quantum Identification without Information Leakage
نویسندگان
چکیده
In 2019, Zhou et al. proposed semi-quantum identification (also known as authentication, SQA), which proceeds under a measure-resend and measurement-free environment. However, al.’s SQA protocol suffers from severe information leakages. An eavesdropper can obtain an intact authentication key without being detected this particular, is vulnerable to double CNOT attacks, while the man-in-the-middle attacks. Hence, study reveals security issues of proposes improved with guaranteed security. The immune Since photons sent back forth are identical, Eve cannot any by cross-comparing these photons. protocol, order transmitted because it was previously pre-shared decide withstand
منابع مشابه
Quantum Advantage on Information Leakage for Equality
We prove a lower bound on the information leakage of any classical protocol computing the equality function in the simultaneous message passing (SMP) model. Our bound is valid in the finite length regime and is strong enough to demonstrate a quantum advantage in terms of information leakage for practical quantum protocols. We prove our bound by obtaining an improved finite size version of the c...
متن کاملQuantum information is incompressible without errors.
A classical random variable can be faithfully compressed into a sequence of bits with its expected length lying within one bit of Shannon entropy. We generalize this variable-length and faithful scenario to the general quantum source producing mixed states rho(i) with probability p(i). In contrast to the classical case, the optimal compression rate in the limit of large block length differs fro...
متن کاملInformation Extraction with and without Parsing Semi-structured Documents
Information extraction from semi-structured documents comprises contents detection, wrapper generation and schema extraction. The contents detection step corresponds to making training examples in wrapper induction based on machine learning and the schema extraction identifies extracted data types. We formulate the contents detection using the repetitive pattern introduced in this paper. That i...
متن کاملHandling Declared Information Leakage
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define formal tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. We propose to define security policies as rewriting systems. Such policies define how the privac...
متن کاملInformation Leakage Games
We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2023
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math11020452