Unitary operation attack and the improvement on probabilistic quantum key distribution

Tzu Han Lin, Chun Wei Yang, Tzonelih Huang

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

This study points out that a malicious communicant in Hwang et al.'s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve the problem.

Original languageEnglish
Pages (from-to)757-762
Number of pages6
JournalQuantum Information and Computation
Volume14
Issue number9-10
Publication statusPublished - 2014 Jan 1

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Statistical and Nonlinear Physics
  • Nuclear and High Energy Physics
  • Mathematical Physics
  • Physics and Astronomy(all)
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Unitary operation attack and the improvement on probabilistic quantum key distribution'. Together they form a unique fingerprint.

Cite this