Semi-Quantum Identification without Information Leakage

نویسندگان

چکیده

In 2019, Zhou et al. proposed semi-quantum identification (also known as authentication, SQA), which proceeds under a measure-resend and measurement-free environment. However, al.’s SQA protocol suffers from severe information leakages. An eavesdropper can obtain an intact authentication key without being detected this particular, is vulnerable to double CNOT attacks, while the man-in-the-middle attacks. Hence, study reveals security issues of proposes improved with guaranteed security. The immune Since photons sent back forth are identical, Eve cannot any by cross-comparing these photons. protocol, order transmitted because it was previously pre-shared decide withstand

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Advantage on Information Leakage for Equality

We prove a lower bound on the information leakage of any classical protocol computing the equality function in the simultaneous message passing (SMP) model. Our bound is valid in the finite length regime and is strong enough to demonstrate a quantum advantage in terms of information leakage for practical quantum protocols. We prove our bound by obtaining an improved finite size version of the c...

متن کامل

Quantum information is incompressible without errors.

A classical random variable can be faithfully compressed into a sequence of bits with its expected length lying within one bit of Shannon entropy. We generalize this variable-length and faithful scenario to the general quantum source producing mixed states rho(i) with probability p(i). In contrast to the classical case, the optimal compression rate in the limit of large block length differs fro...

متن کامل

Information Extraction with and without Parsing Semi-structured Documents

Information extraction from semi-structured documents comprises contents detection, wrapper generation and schema extraction. The contents detection step corresponds to making training examples in wrapper induction based on machine learning and the schema extraction identifies extracted data types. We formulate the contents detection using the repetitive pattern introduced in this paper. That i...

متن کامل

Handling Declared Information Leakage

We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define formal tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. We propose to define security policies as rewriting systems. Such policies define how the privac...

متن کامل

Information Leakage Games

We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2023

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math11020452