Security Analysis of Quantum Cryptographic Protocols

In this chapter, we review the principle of some common quantum attacks, such as intercept-and-resend attack, teleportation attack, man-in-the-middle attack, participant attack, and implementation attack. Also, we introduce some general security analysis methods, such as BAN logic, random oracle model, and quantum-accessible random oracle model. These methods for classical cryptographic protocols can provide effective tools for quantum cryptographic protocols.

[1]  Zhang Shou,et al.  Secret sharing of quantum information via entanglement swapping , 2006 .

[2]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[3]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[4]  Huadeng Wang,et al.  Man-in-the-middle attack on BB84 protocol and its defence , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[5]  Gilles Brassard,et al.  Merkle Puzzles in a Quantum World , 2011, CRYPTO.

[6]  Mihir Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[7]  Mihir Bellare,et al.  Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .

[8]  Mark Zhandry,et al.  Random Oracles in a Quantum World , 2010, ASIACRYPT.

[9]  Xiangfu Zou,et al.  Attacks and Improvements of QSDC Schemes Based on CSS Codes , 2011, ICIC.

[10]  宋婷婷,et al.  Participant attack on quantum secret sharing based on entanglement swapping , 2009 .

[11]  Lütkenhaus Security against eavesdropping in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[12]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[13]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.

[14]  Wen Qiao-Yan,et al.  Forcible-Measurement Attack on Quantum Secure Direct Communication Protocol with Cluster State , 2008 .

[15]  Dag Roar Hjelme,et al.  Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography , 2001 .

[16]  Ma Zhi,et al.  Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes , 2006 .

[17]  Mihir Bellare,et al.  Optimal Asymmetric Encryption , 1994, EUROCRYPT.

[18]  Scott Aaronson,et al.  Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.

[19]  Wen Qiao-Yan,et al.  Teleportation attack on the QSDC protocol with a random basis and order , 2008 .

[20]  Dag R. Hjelme,et al.  Faked states attack on quantum cryptosystems , 2005 .

[21]  宋杰,et al.  Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order , 2007 .

[22]  Qiao-Yan Wen,et al.  Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.