Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e., the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. Finally, the root cause of this insecurity and a possible way to improve these protocols are discussed.

[1]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[2]  Fuguo Deng,et al.  Bidirectional quantum secret sharing and secret splitting with polarized single photons , 2005, quant-ph/0504119.

[3]  Wang Yan,et al.  Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .

[4]  S. Barnett,et al.  Multi-user Quantum Cryptography on Optical Networks , 1995 .

[5]  Qiaoyan Wen,et al.  Quantum secure direct communication over the collective amplitude damping channel , 2009 .

[6]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[7]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[8]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[9]  Antoni Wojcik,et al.  Comment on 'Quantum dense key distribution' , 2005 .

[10]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[11]  Dieter Meschede,et al.  Quantum engineering: An atom-sorting machine , 2006, Nature.

[12]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[13]  XingLan Zhang One-way quantum identity authentication based on public key , 2009 .

[14]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[15]  A. Tajima,et al.  Ensuring Quality of Shared Keys Through Quantum Key Distribution for Practical Application , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[16]  K. Inoue,et al.  Quantum key distribution technologies , 2006, IEEE Journal of Selected Topics in Quantum Electronics.

[17]  Qiao-Yan Wen,et al.  Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.

[18]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[19]  Wen Qiao-Yan,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[20]  Guang-Can Guo,et al.  Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .

[21]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[22]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[23]  Fen-Zhuo Guo,et al.  Consistency of shared reference frames should be reexamined , 2008 .

[24]  Hao Liang,et al.  Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution , 2010 .

[25]  A. Tajima,et al.  Practical Quantum Cryptosystem for Metro Area Applications , 2007, IEEE Journal of Selected Topics in Quantum Electronics.

[26]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[27]  Qiao-Yan Wen,et al.  Quantum secure direct communication with cluster states , 2010 .

[28]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[29]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[30]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[31]  David Nowak,et al.  A Framework for Game-Based Security Proofs , 2007, ICICS.

[32]  Neil Genzlinger A. and Q , 2006 .

[33]  M. Dušek,et al.  Quantum identification system , 1998, quant-ph/9809024.

[34]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[35]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[36]  H.P. Yuen,et al.  Key Generation: Foundations and a New Quantum Approach , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[37]  高飞,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[38]  A. Tajima,et al.  Technologies for Quantum Key Distribution Networks Integrated With Optical Communication Networks , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[39]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[40]  Gan Gao,et al.  Reexamining the security of the improved quantum secret sharing scheme , 2009 .

[41]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[42]  Qiaoyan Wen,et al.  Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .

[43]  Yan Wang,et al.  Secure quantum key distribution network with Bell states and local unitary operations , 2007, 0705.1746.

[44]  Dong Liu,et al.  Field experiment on a robust hierarchical metropolitan quantum cryptography network , 2009 .

[45]  Fei Gao,et al.  A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..

[46]  Tzonelih Hwang,et al.  New Efficient Three-Party Quantum Key Distribution Protocols , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[47]  林崧,et al.  Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations , 2009 .

[48]  Zhang Yu-qing,et al.  Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations , 2010 .

[49]  Victor Shoup,et al.  Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..

[50]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[51]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[52]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[53]  Hoi-Kwong Lo,et al.  Some attacks on quantum-based cryptographic protocols , 2005, Quantum Inf. Comput..

[54]  Wen Qiao-Yan,et al.  Teleportation attack on the QSDC protocol with a random basis and order , 2008 .