中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
Cryptanalysis of a multi-party quantum key agreement protocol with single particles
Author: Huang, Wei (1) ; Wen, Qiao-Yan (1) ; Liu, Bin (1) ; Su, Qi (1) ; Gao, Fei (1)
Corresponding Author: Huang, W.(huangwei096505@aliyun.com)
Keyword: Quantum cryptography ; Quantum key agreement ; Cryptanalysis
Source: Quantum Information Processing
Issued Date: 2014
Volume: 13, Issue:7, Pages:1651-1657
Indexed Type: SCI ; EI
Department: (1) State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; (2) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
Abstract: Recently, Sun et al. (Quantum Inf Process 12:3411-3420, 2013) presented an efficient multi-party quantum key agreement (QKA) protocol by employing single particles and unitary operations. The aim of this protocol is to fairly and securely negotiate a secret session key among N parties with a high qubit efficiency. In addition, the authors claimed that no participant can learn anything more than his/her prescribed output in this protocol, i.e.; the sub-secret keys of the participants can be kept secret during the protocol. However, here we point out that the sub-secret of a participant in Sun et al.'s protocol can be eavesdropped by the two participants next to him/her. Moreover, a certain number of dishonest participants can fully determine the final shared key in this protocol. Finally, we discuss the factors that should be considered when designing a really fair and secure QKA protocol. © 2014 Springer Science+Business Media New York.
English Abstract: Recently, Sun et al. (Quantum Inf Process 12:3411-3420, 2013) presented an efficient multi-party quantum key agreement (QKA) protocol by employing single particles and unitary operations. The aim of this protocol is to fairly and securely negotiate a secret session key among N parties with a high qubit efficiency. In addition, the authors claimed that no participant can learn anything more than his/her prescribed output in this protocol, i.e.; the sub-secret keys of the participants can be kept secret during the protocol. However, here we point out that the sub-secret of a participant in Sun et al.'s protocol can be eavesdropped by the two participants next to him/her. Moreover, a certain number of dishonest participants can fully determine the final shared key in this protocol. Finally, we discuss the factors that should be considered when designing a really fair and secure QKA protocol. © 2014 Springer Science+Business Media New York.
Language: 英语
WOS ID: WOS:000337604800014
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/16852
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Huang, Wei ,Wen, Qiao-Yan ,Liu, Bin ,et al. Cryptanalysis of a multi-party quantum key agreement protocol with single particles[J]. Quantum Information Processing,2014-01-01,13(7):1651-1657.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Huang, Wei (1)]'s Articles
[Wen, Qiao-Yan (1)]'s Articles
[Liu, Bin (1)]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Huang, Wei (1)]‘s Articles
[Wen, Qiao-Yan (1)]‘s Articles
[Liu, Bin (1)]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace