Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








490 Hits in 3.8 sec

Robustness of two-way quantum communication protocols against Trojan horse attack [article]

Fu-Guo Deng, Ping Zhou, Xi-Han Li, Chun-Yan Li, Hong-Yu Zhou
2005 arXiv   pre-print
We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack.  ...  Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks.  ...  In this way, Alice can improve the security of two-way quantum communication protocols against the Trojan horse attacks.  ... 
arXiv:quant-ph/0508168v1 fatcat:3lyrpxcdm5fixbklt4zyyefyq4

TROJAN HORSE ATTACKING STRATEGY ON QUANTUM CRYPTOGRAPHY

GUIHUA ZENG
2003 The Physics of Communication  
Trojan horse attacking strategy on quantum cryptography is investigated, three aspects are involved.  ...  First, the mechanism for the Trojan horse attacking strategy on quantum cryptography as well as classic cryptography is studied.  ...  Introduction In private communication and data security attackers (e.g., adversary and/or ragger) will try to break the employed confidential system for their benefits.  ... 
doi:10.1142/9789812704634_0032 fatcat:li4jaxrnebdspiplrdts4bbkd4

Improving the security of secure direct communication based on the secret transmitting order of particles

Xi-Han Li, Fu-Guo Deng, Hong-Yu Zhou
2006 Physical Review A. Atomic, Molecular, and Optical Physics  
A 73, 022338 (2006)], and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies.  ...  We analyzed the security of the secure direct communication protocol based on secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang [Phys. Rev.  ...  There are two kinds of Trojan horse attack strategies. One is the invisible photon eavesdropping (IPE) scheme proposed by Cai [26] and the other is the delay-photon Trojan horse attack [5, 27] .  ... 
doi:10.1103/physreva.74.054302 fatcat:en7w3gu5krgetdurjzv4w4fhwy

High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with Hyperentanglement

Tie-Jun Wang, Tao Li, Fang-Fang Du, Fu-Guo Deng
2011 Chinese Physics Letters  
(QSDC) protocol based on this quantum hyperdense coding protocol.  ...  This QSDC protocol has the advantage of having a higher capacity than the quantum communication protocols with a qubit system.  ...  Then we give a QSDC protocol based on this quantum hyperdense coding protocol and discuss its security against Trojan horse attack strategies.  ... 
doi:10.1088/0256-307x/28/4/040305 fatcat:beo44cmst5dkhoelfq3zvkdw7e

A two-step quantum secure direct communication protocol with hyperentanglement

Bin Gu, Yu-Gai Huang, Xia Fang, Cheng-Yi Zhang
2011 Chinese Physics B  
Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum  ...  signal as it is a one-way quantum communication protocol.  ...  with Trojan horse attack strategies.  ... 
doi:10.1088/1674-1056/20/10/100309 fatcat:cvydv3ljrfgjbc7qgepc2ktjiu

Lightweight Mediated Semi-Quantum Key Distribution Protocol with a Dishonest Third Party based on Bell States [article]

Chia-Wei Tsai, Chun-Wei Yang
2020 arXiv   pre-print
However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness  ...  Therefore, this study takes Bell states as the quantum resource to propose a new MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest.  ...  Moreover, the one-way quantum communication strategy is adopted to design the protocol, and thus the proposed protocol is immune to Trojan horse attacks, implying that the classical participants do not  ... 
arXiv:1909.02788v2 fatcat:2vs6nz433jaxpdva345ywmxq6i

Information leakage resistant quantum dialogue against collective noise

TianYu Ye
2014 Science China Physics Mechanics and Astronomy  
Moreover, the detailed security analysis also shows that Eve's several famous active attacks can be effectively overcome, such as the Trojan horse attack, the intercept-resend attack, the measure-resend  ...  In this paper, two information leakage resistant quantum dialogue (QD) protocols over a collective-noise channel are proposed.  ...  Now its effectiveness against Eve's several famous active attacks is demonstrated in detail as follows. ①The Trojan horse attacks There are two kinds of Trojan horse attack strategies, i.e., the invisible  ... 
doi:10.1007/s11433-014-5566-2 fatcat:liytvbxs3rfe3nv5kqw6jkmp7i

Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom

Tian-Yu Ye, Hong-Kun Li, Jia-Li Hu
2021 Quantum Information Processing  
Moreover, the detailed security analysis also shows that the proposed QD protocol can resist Eve's several famous active attacks, such as the Trojan horse attack, the intercept-resend attack, the measure-resend  ...  In this paper, a novel quantum dialogue (QD) protocol is proposed based on single photons in both polarization and spatial-mode degrees of freedom.  ...  Now we validate its effectiveness against Eve's several active attacks as follows. ① The Trojan horse attacks There are two kinds of Trojan horse attack strategies, i.e., the invisible photon eavesdropping  ... 
doi:10.1007/s11128-021-03120-1 fatcat:mvzpcv6avbdoxbr65ll2hgfx4y

DIFFERENT VULNERABILITIES AND CHALLENGES OF QUANTUM KEY DISTRIBUTION PROTOCOL: A REVIEW

Chinmoy Ghosh
2017 International Journal of Advanced Research in Computer Science  
In this paper, we examine limitations and vulnerabilities and attacks to which Quantum Key Distribution can be exposed.  ...  Today we use different sophisticated, robust encryption algorithm which are vulnerable to classical computational attack as well as the powerful parallel quantum computer.  ...  The most powerful of these attacks are the Trojan Horse attacks and the Photon Number splitting strategy.  ... 
doi:10.26483/ijarcs.v8i8.4680 fatcat:5jytr6efuvbp7bbbqmzcieoxd4

Quantum Secure Communication Protocol Based on Single-photon

Guoan Zhao
2015 International Journal of Security and Its Applications  
the eavesdroppers and two-way communication only a single authentication and there is not visible to eavesdropping and delayed photon attack Trojan horse attack.  ...  We also propose bidirectional quantum security communication protocol that only needs single check without invisible eavesdropping or Trojan horse attack of delay photon attack.  ...  However, common Trojan horse attacks, including invisible eavesdropping [32] and delay photon attack [33] , have no effect on the unidirectional quantum communication.  ... 
doi:10.14257/ijsia.2015.9.3.20 fatcat:65khm3jkbzclvbn43lgkmhtc3m

Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution

M. Lucamarini, I. Choi, M. B. Ward, J. F. Dynes, Z. L. Yuan, A. J. Shields
2015 Physical Review X  
In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices.  ...  Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements.  ...  Rate equations for two specific Trojan-horse attacks Trojan-horse attack with a passive use of the Trojan photons We analyze the security of the BB84 protocol against a different, less general, THA.  ... 
doi:10.1103/physrevx.5.031030 fatcat:zmhnr3jphjco7bxf4fmjxlwdmq

Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels

Wei Huang, Qiao-Yan Wen, Bin Liu, Fei Gao
2015 Chinese Physics B  
A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network.  ...  The security of all the proposed protocols is guaranteed by the theorems on quantum operation discrimination.  ...  What's more, if an eavesdropper performs the trojan horse attack [54] , he will be able to get the information of the unitary operations in bidirectional communication.  ... 
doi:10.1088/1674-1056/24/7/070308 fatcat:u26msihlcbbaxicdoatarfwmcy

Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

Fei Gao, Su-Juan Qin, Fen-Zhuo Guo, Qiao-Yan Wen
2011 IEEE Journal of Quantum Electronics  
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one.  ...  The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed.  ...  that to prevent Trojan horse attack.  ... 
doi:10.1109/jqe.2011.2107889 fatcat:3axr4mfqhrdgdpwcvbgwmsf25e

Semiquantum private comparison based on Bell states without quantum measurements from the classical user [article]

Mao-Jie Geng, Xia Li, Tian-Yu Ye
2023 arXiv   pre-print
In this paper, we propose a novel semiquantum private comparison (SQPC) protocol based on Bell states, which enables one quantum user and one classical user to compare the equality of their private inputs  ...  TP is assumed to be semi-honest in the sense that she may take all possible attacks to steal users' private inputs except conspiring with anyone.  ...  eavesdropping attack [40] and the delay-photon Trojan horse attack [41, 42] from Eve.  ... 
arXiv:2205.04927v3 fatcat:pqcgai3zhbdupkazmyk2gdsvqq

Quantum Malware

Lian-Ao Wu, Daniel Lidar
2006 Quantum Information Processing  
When quantum communication networks proliferate they will likely be subject to a new type of attack: by hackers, virus makers, and other malicious intruders.  ...  It applies to arbitrary attack types, provided the protective operations are themselves not compromised.  ...  In particular, in the context of the security proof of quantum key distribution, it was shown that teleportation can be used to reduce a quantum trojan horse attack to a classical one.  ... 
doi:10.1007/s11128-006-0014-5 fatcat:kqz6gdqgsvecznhartz4vhxthe
« Previous Showing results 1 — 15 out of 490 results