TY - JOUR
T1 - Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"
AU - Chong, Song Kong
AU - Tsai, Chia Wei
AU - Hwang, Tzonelih
N1 - Funding Information:
Acknowledgements The authors would like to thank the anonymous reviewers’ valuable comments and suggestions to improve the clarity and readability of this article. This article is financially supported by the National Science Council of the Republic of China, Taiwan for financially supporting this research under the Contract No. NSC 98-2221-E-006-097-MY3.
PY - 2011/6
Y1 - 2011/6
N2 - Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.
AB - Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.
UR - https://www.scopus.com/pages/publications/79954629284
UR - https://www.scopus.com/pages/publications/79954629284#tab=citedBy
U2 - 10.1007/s10773-011-0691-4
DO - 10.1007/s10773-011-0691-4
M3 - Article
AN - SCOPUS:79954629284
SN - 0020-7748
VL - 50
SP - 1793
EP - 1802
JO - International Journal of Theoretical Physics
JF - International Journal of Theoretical Physics
IS - 6
ER -