CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"

Ching Ying Lin, Tzonelih Hwang

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)


This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys. This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT (CNOT) extraction attack. A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.

Original languageEnglish
Pages (from-to)1001-1003
Number of pages3
JournalScience China: Physics, Mechanics and Astronomy
Issue number5
Publication statusPublished - 2014 May

All Science Journal Classification (ASJC) codes

  • Physics and Astronomy(all)


Dive into the research topics of 'CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"'. Together they form a unique fingerprint.

Cite this