Security aspects of the authentication used in quantum key growing

被引:0
|
作者
Cederlof, Jorgen [1 ]
Larsson, Jan-Ake [1 ]
机构
[1] Linkoping Univ, SE-58183 Linkoping, Sweden
关键词
quantum cryptography; quantum key distribution; quantum key growing; authentication;
D O I
10.1117/12.689682
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unconditionally secure message authentication is an important part of Quantum Cryptography (QC). We analyze security effects of using a key obtained from QC in later rounds of QC. It has been determined earlier that partial knowledge of the key in itself does not incur a security problem. However, by accessing the quantum channel used in QC, the attacker can change the message to be authenticated. This, together with partial knowledge of the key does incur a security weakness of the authentication. We suggest a simple solution to this problem, and stress usage of this or an equivalent extra security measure in QC.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Password authentication key exchange based on key consensus for IoT security
    Zhao, Zongqu
    Ma, Shaoti
    Qin, Panke
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 837 - 846
  • [22] Password authentication key exchange based on key consensus for IoT security
    Zongqu Zhao
    Shaoti Ma
    Panke Qin
    Cluster Computing, 2023, 26 : 1 - 12
  • [23] Security of Quantum Key Distribution
    Beaudry, Normand
    Ferenczi, Agnes
    Narasimhachar, Varun
    Moroder, Tobias
    Ma, Xiongfeng
    Piani, Marco
    Luekenhaus, Norbert
    2010 CONFERENCE ON OPTICAL FIBER COMMUNICATION OFC COLLOCATED NATIONAL FIBER OPTIC ENGINEERS CONFERENCE OFC-NFOEC, 2010,
  • [24] Security of quantum key distribution
    Renner, Renato
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (01) : 1 - 127
  • [25] Security of Quantum Key Distribution
    Yuen, Horace P.
    IEEE ACCESS, 2016, 4 : 724 - 749
  • [26] Security of a control key in quantum key distribution
    Rehman, Junaid Ur
    Qaisar, Saad
    Jeong, Youngmin
    Shin, Hyundong
    MODERN PHYSICS LETTERS B, 2017, 31 (11):
  • [27] A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
    Kolesnikov, Vladimir
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 235 - 252
  • [28] Security of public key certificate based authentication protocols
    Wen, W
    Saito, T
    Mizoguchi, F
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209
  • [29] Study on the security of the authentication scheme with key recycling in QKD
    Qiong Li
    Qiang Zhao
    Dan Le
    Xiamu Niu
    Quantum Information Processing, 2016, 15 : 3815 - 3831
  • [30] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,