Unitary operation attack and the improvement on probabilistic quantum key distribution

Tzu Han Lin, Chun Wei Yang, Tzonelih Huang

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This study points out that a malicious communicant in Hwang et al.'s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve the problem.

Original languageEnglish
Pages (from-to)757-762
Number of pages6
JournalQuantum Information and Computation
Volume14
Issue number9-10
Publication statusPublished - 2014 Jan 1

Fingerprint

Quantum cryptography
Quantum Key Distribution
attack
Attack
Fairness
requirements
Requirements

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Statistical and Nonlinear Physics
  • Nuclear and High Energy Physics
  • Mathematical Physics
  • Physics and Astronomy(all)
  • Computational Theory and Mathematics

Cite this

@article{3f33764b1b8044e79c14945c1326f649,
title = "Unitary operation attack and the improvement on probabilistic quantum key distribution",
abstract = "This study points out that a malicious communicant in Hwang et al.'s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve the problem.",
author = "Lin, {Tzu Han} and Yang, {Chun Wei} and Tzonelih Huang",
year = "2014",
month = "1",
day = "1",
language = "English",
volume = "14",
pages = "757--762",
journal = "Quantum Information and Computation",
issn = "1533-7146",
publisher = "Rinton Press Inc.",
number = "9-10",

}

Unitary operation attack and the improvement on probabilistic quantum key distribution. / Lin, Tzu Han; Yang, Chun Wei; Huang, Tzonelih.

In: Quantum Information and Computation, Vol. 14, No. 9-10, 01.01.2014, p. 757-762.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Unitary operation attack and the improvement on probabilistic quantum key distribution

AU - Lin, Tzu Han

AU - Yang, Chun Wei

AU - Huang, Tzonelih

PY - 2014/1/1

Y1 - 2014/1/1

N2 - This study points out that a malicious communicant in Hwang et al.'s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve the problem.

AB - This study points out that a malicious communicant in Hwang et al.'s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve the problem.

UR - http://www.scopus.com/inward/record.url?scp=84900804749&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84900804749&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84900804749

VL - 14

SP - 757

EP - 762

JO - Quantum Information and Computation

JF - Quantum Information and Computation

SN - 1533-7146

IS - 9-10

ER -