Comment on “A practical protocol for three-party authenticated quantum key distribution”

Guan et al. (Quantum Inf Process 13(11):2355–2374, 2014) proposed a three-party authenticated quantum key distribution protocol which allows two participants to authenticate each other and eventually share a session key between them with the help of a trusted center (TC), who has pre-shared a master key with each participant, respectively. After a successful authentication and key distribution process, TC and the participants update their master keys, respectively. However, this study points out that Guan et al.’s scheme suffers from the intercept-and-measure attack and information leakage problem, and has the synchronization problem.

[1]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[2]  Gao Gan,et al.  Quantum Key Distribution Scheme with High Efficiency , 2009 .

[3]  Chong Li,et al.  A random quantum key distribution achieved by using Bell states , 2003 .

[4]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[5]  Daegene Song Secure key distribution by swapping quantum entanglement , 2003, quant-ph/0305168.

[6]  Tzonelih Hwang,et al.  Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.

[7]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[8]  Tzonelih Hwang,et al.  EPR quantum key distribution protocols with potential 100% qubit efficiency , 2007, IET Inf. Secur..

[9]  R. Namiki,et al.  Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection , 2006, quant-ph/0608144.

[10]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[11]  D. J. Guan,et al.  A practical protocol for three-party authenticated quantum key distribution , 2014, Quantum Information Processing.

[12]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[13]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.