Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

Song Kong Chong, Chia Wei Tsai, Tzone-Lih Hwang

Research output: Contribution to journalArticle

63 Citations (Scopus)

Abstract

Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

Original languageEnglish
Pages (from-to)1793-1802
Number of pages10
JournalInternational Journal of Theoretical Physics
Volume50
Issue number6
DOIs
Publication statusPublished - 2011 Jun 1

Fingerprint

Key Agreement Protocol
Entangled State
attack
congressional reports
Information Security
Taiwan
Attack
Cryptology
defects

All Science Journal Classification (ASJC) codes

  • Physics and Astronomy (miscellaneous)
  • Mathematics(all)

Cite this

@article{9c4bfb1e102c46018682e83fed08a4a0,
title = "Improvement on {"}Quantum Key Agreement Protocol with Maximally Entangled States{"}",
abstract = "Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.",
author = "Chong, {Song Kong} and Tsai, {Chia Wei} and Tzone-Lih Hwang",
year = "2011",
month = "6",
day = "1",
doi = "10.1007/s10773-011-0691-4",
language = "English",
volume = "50",
pages = "1793--1802",
journal = "International Journal of Theoretical Physics",
issn = "0020-7748",
publisher = "Springer New York",
number = "6",

}

Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States". / Chong, Song Kong; Tsai, Chia Wei; Hwang, Tzone-Lih.

In: International Journal of Theoretical Physics, Vol. 50, No. 6, 01.06.2011, p. 1793-1802.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

AU - Chong, Song Kong

AU - Tsai, Chia Wei

AU - Hwang, Tzone-Lih

PY - 2011/6/1

Y1 - 2011/6/1

N2 - Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

AB - Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

UR - http://www.scopus.com/inward/record.url?scp=79954629284&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79954629284&partnerID=8YFLogxK

U2 - 10.1007/s10773-011-0691-4

DO - 10.1007/s10773-011-0691-4

M3 - Article

VL - 50

SP - 1793

EP - 1802

JO - International Journal of Theoretical Physics

JF - International Journal of Theoretical Physics

SN - 0020-7748

IS - 6

ER -