Insecurity of position-based quantum cryptography protocols against entanglement attacks

نویسنده

  • Hoi-Kwong Lo
چکیده

Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate at most 85modified protocol is secure when the shared quantum resource between the adversaries is a twoor threelevel system. Reference: http://arxiv.org/abs/1009.2256 Co-author Hoi-Kwan Lau (University of Toronto) January 4-5, 2011, Hong Kong

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables

We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob. This is achieved by reversing the reconciliation procedure subsequent to the quantum transmission, that is, using Bob’s instead of Alice’s data to build the key....

متن کامل

On the Power and Usability of Quantum Cryptography

Threats and attacks to information on the digital network environment are growing rapidly; this puts extra pressure on individuals and business, as they will have to protect their privacy and intellectual property, then. Therefore, cryptographic security protocols have been developed to maintain privacy between communicating parties and to reduce the risk of malicious attacks. However, most of ...

متن کامل

Simplified instantaneous non-local quantum computation with applications to position-based cryptography

Instantaneous measurements of non-local observables between space-like separated regions can be performed without violating causality. This feat relies on the use of entanglement. Here we propose novel protocols for this task and the related problem of multipartite quantum computation with local operations and a single round of classical communication. Compared to previously known techniques, o...

متن کامل

ar X iv : 1 10 1 . 10 65 v 3 [ qu an t - ph ] 2 0 Se p 20 11 Simplified instantaneous non - local quantum computation with applications to position - based cryptography

Instantaneous measurements of non-local observables between space-like separated regions can be performed without violating causality. This feat relies on the use of entanglement. Here we propose novel protocols for this task and the related problem of multipartite quantum computation with local operations and a single round of classical communication. Compared to previously known techniques, o...

متن کامل

ua nt - p h / 03 10 15 6 v 1 2 6 O ct 2 00 3 Quantum and classical advantage distillation are not equivalent

We report that, for the generation of a secure cryptographic key from correlations established through a noisy quantum channel, the quantum and classical advantage distillation procedures are not equivalent, when coherent eavesdropping attacks are duly taken into account. The quantum procedure can tolerate markedly more noise in the channel than the classical procedure. One of the important pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010