Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This study points out that Zhu et al.'s quantum key agreement protocol (Quantum Inf Process 14(11): 4245-4254) suffers from a collusive attack. That is, two dishonest participants in the protocol can collaborate to manipulate the final secret key without being detected.

Original languageEnglish
Title of host publication2017 IEEE Conference on Dependable and Secure Computing
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages520-521
Number of pages2
ISBN (Electronic)9781509055692
DOIs
Publication statusPublished - 2017 Oct 18
Event2017 IEEE Conference on Dependable and Secure Computing - Taipei, Taiwan
Duration: 2017 Aug 72017 Aug 10

Publication series

Name2017 IEEE Conference on Dependable and Secure Computing

Other

Other2017 IEEE Conference on Dependable and Secure Computing
CountryTaiwan
CityTaipei
Period17-08-0717-08-10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality
  • Software

Cite this

Gu, J., & Hwang, T-L. (2017). Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. In 2017 IEEE Conference on Dependable and Secure Computing (pp. 520-521). [8073872] (2017 IEEE Conference on Dependable and Secure Computing). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/DESEC.2017.8073872
Gu, Jun ; Hwang, Tzone-Lih. / Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., 2017. pp. 520-521 (2017 IEEE Conference on Dependable and Secure Computing).
@inproceedings{e5a3338e666b4769b0deff5ea87b6ae7,
title = "Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'",
abstract = "This study points out that Zhu et al.'s quantum key agreement protocol (Quantum Inf Process 14(11): 4245-4254) suffers from a collusive attack. That is, two dishonest participants in the protocol can collaborate to manipulate the final secret key without being detected.",
author = "Jun Gu and Tzone-Lih Hwang",
year = "2017",
month = "10",
day = "18",
doi = "10.1109/DESEC.2017.8073872",
language = "English",
series = "2017 IEEE Conference on Dependable and Secure Computing",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "520--521",
booktitle = "2017 IEEE Conference on Dependable and Secure Computing",
address = "United States",

}

Gu, J & Hwang, T-L 2017, Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. in 2017 IEEE Conference on Dependable and Secure Computing., 8073872, 2017 IEEE Conference on Dependable and Secure Computing, Institute of Electrical and Electronics Engineers Inc., pp. 520-521, 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, 17-08-07. https://doi.org/10.1109/DESEC.2017.8073872

Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. / Gu, Jun; Hwang, Tzone-Lih.

2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., 2017. p. 520-521 8073872 (2017 IEEE Conference on Dependable and Secure Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'

AU - Gu, Jun

AU - Hwang, Tzone-Lih

PY - 2017/10/18

Y1 - 2017/10/18

N2 - This study points out that Zhu et al.'s quantum key agreement protocol (Quantum Inf Process 14(11): 4245-4254) suffers from a collusive attack. That is, two dishonest participants in the protocol can collaborate to manipulate the final secret key without being detected.

AB - This study points out that Zhu et al.'s quantum key agreement protocol (Quantum Inf Process 14(11): 4245-4254) suffers from a collusive attack. That is, two dishonest participants in the protocol can collaborate to manipulate the final secret key without being detected.

UR - http://www.scopus.com/inward/record.url?scp=85039918996&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85039918996&partnerID=8YFLogxK

U2 - 10.1109/DESEC.2017.8073872

DO - 10.1109/DESEC.2017.8073872

M3 - Conference contribution

T3 - 2017 IEEE Conference on Dependable and Secure Computing

SP - 520

EP - 521

BT - 2017 IEEE Conference on Dependable and Secure Computing

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Gu J, Hwang T-L. Comment on 'improving the security of protocols of quantum key agreement solely using bell states and bell measurement'. In 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc. 2017. p. 520-521. 8073872. (2017 IEEE Conference on Dependable and Secure Computing). https://doi.org/10.1109/DESEC.2017.8073872