CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"

Ching Ying Lin, Tzonelih Hwang

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys. This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT (CNOT) extraction attack. A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.

Original languageEnglish
Pages (from-to)1001-1003
Number of pages3
JournalScience China: Physics, Mechanics and Astronomy
Volume57
Issue number5
DOIs
Publication statusPublished - 2014 May

All Science Journal Classification (ASJC) codes

  • Physics and Astronomy(all)

Fingerprint Dive into the research topics of 'CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"'. Together they form a unique fingerprint.

  • Cite this