Secure authentication of classical messages with decoherence-free states

We present an efficient scheme for secure authentication of classical messages with decoherence-free states and hash functions. We also analyze the security of this scheme and show it is not possible to forge valid message authentication codes. In addition, the lengths of the authentication key and message authentication codes are invariant no mater how long the length of the message to be authenticated is. Moreover, although this scheme uses entangled states for encoding, only single-particle product measurements are required.

[1]  Yuan Tian,et al.  A weak blind signature scheme based on quantum cryptography , 2009 .

[2]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[3]  杨宇光,et al.  An efficient quantum secure direct communication scheme with authentication , 2007 .

[4]  Lin-Mei Liang,et al.  Robust quantum key distribution with two-photon polarization states , 2006 .

[5]  Ramesh Karri,et al.  A High-Speed Hardware Architecture for Universal Message Authentication Code , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Xiang‐Bin Wang Fault tolerant quantum key distribution protocol with collective random unitary noise , 2005 .

[7]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[8]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[9]  K. B. Whaley,et al.  Theory of decoherence-free fault-tolerant universal quantum computation , 2000, quant-ph/0004064.

[10]  Christian Kurtsiefer,et al.  High-fidelity source of four-photon entanglement , 2003 .

[11]  Christian Kurtsiefer,et al.  Decoherence-free quantum information processing with four-photon entangled states. , 2004, Physical review letters.

[12]  Xi-Han Li,et al.  Efficient quantum key distribution over a collective noise channel (6 pages) , 2008, 0808.0042.

[13]  Hwayean Lee,et al.  Arbitrated quantum signature scheme with message recovery , 2004 .

[14]  W. Zurek The Environment, Decoherence and the Transition from Quantum to Classical , 1991 .

[15]  M. Teich,et al.  Decoherence-free subspaces in quantum key distribution. , 2003, Physical review letters.

[16]  R. Laflamme,et al.  Robust polarization-based quantum key distribution over a collective-noise channel. , 2003, Physical review letters.

[17]  Li Dong,et al.  Deterministic secure quantum communication against collective-dephasing noise by using EPR pairs and auxiliary photons , 2009 .

[18]  M. Curty,et al.  Quantum authentication of classical messages , 2001, quant-ph/0103122.

[19]  Christian Kurtsiefer,et al.  Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. , 2007, Physical review letters.

[20]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[21]  Shi-Jinn Horng,et al.  Comment on “A special attack on the multiparty quantum secret sharing of secure direct communication using single photons” , 2008 .

[22]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[23]  Qiaoyan Wen,et al.  Cryptanalysis and improvement of multiparty quantum secret sharing schemes , 2008 .

[24]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  R. Laflamme,et al.  Robust quantum communication using a polarization-entangled photon pair. , 2004, Physical review letters.

[27]  Everett M. Rogers,et al.  The Rise and Fall of the Dominant Paradigm , 1978 .

[28]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[29]  P. Zanardi,et al.  Noiseless Quantum Codes , 1997, quant-ph/9705044.

[30]  Qiao-Yan Wen,et al.  Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.

[31]  Xiu-Bo Chen,et al.  An efficient and secure multiparty quantum secret sharing scheme based on single photons , 2008 .

[32]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.