Concerning Quantum Identification Without Entanglement

Identification schemes are interactive protocols typically involving two parties, a prover, who wants to provide evidence of his or her identity and a verifier, who checks the provided evidence and decide whether it comes or not from the intended prover. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki, and give a concrete attack upholding theoretical impossibility results from Lo and Buhrman et al. More precisely, we show that using a simple strategyan adversary may indeed obtain non-negligible information on the shared identification secret. While the security of a quantum identity authentication scheme is not formally defined in [1], it is clear that such a definition should somehow imply that an external entity may gain no information on the shared identification scheme (even if he actively participates injecting messages in a protocol execution, which is not assumed in our attack strategy).

[1]  Ivan Damgård,et al.  Secure identification and QKD in the bounded-quantum-storage model , 2007, Theor. Comput. Sci..

[2]  Takashi Mihara,et al.  Quantum identification schemes with entanglements , 2002 .

[3]  Jian Li,et al.  Quantum key distribution and quantum authentication based on entangled state , 2001, quant-ph/0102058.

[4]  Chen Yuan,et al.  Quantum Authentication Scheme Based on Entanglement Swapping , 2016 .

[5]  Serge Fehr,et al.  An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification , 2011, TQC.

[6]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[7]  Jun Zhu,et al.  QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES , 2011 .

[8]  Piotr Zawadzki,et al.  Quantum identity authentication without entanglement , 2018, Quantum Information Processing.

[9]  Daesung Kwon,et al.  Quantum identity authentication with single photon , 2017, Quantum Information Processing.

[10]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[11]  Xiaoyu Li,et al.  Quantum Authentication Using Entangled States , 2004, Int. J. Found. Comput. Sci..

[12]  Hoi-Kwong Lo,et al.  Insecurity of Quantum Secure Computations , 1996, ArXiv.

[13]  Harry Buhrman,et al.  Complete insecurity of quantum protocols for classical two-party computation Buhrman, , 2012 .

[14]  Guang-Can Guo,et al.  Quantum authentication using entangled state , 2000 .

[15]  Xin Jia,et al.  A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States , 2013 .