Secure Identification and QKD in the Bounded-Quantum-Storage Model

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

22 pages, v2: included one missing reference, v3: substantial update: using more natural version of min-entropy with according

Scientific paper

We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w as possible, namely the adversary can exclude at most one possible password for each execution of the scheme. We propose a solution in the bounded-quantum-storage model, where U and S may exchange qubits, and a dishonest party is assumed to have limited quantum memory. No other restriction is posed upon the adversary. An improved version of the proposed identification scheme is also secure against a man-in-the-middle attack, but requires U and S to additionally share a high-entropy key k. However, security is still guaranteed if one party loses k to the attacker but notices the loss. In both versions of the scheme, the honest participants need no quantum memory, and noise and imperfect quantum sources can be tolerated. The schemes compose sequentially, and w and k can securely be re-used. A small modification to the identification scheme results in a quantum-key-distribution (QKD) scheme, secure in the bounded-quantum-storage model, with the same re-usability properties of the keys, and without assuming authenticated channels. This is in sharp contrast to known QKD schemes (with unbounded adversary) without authenticated channels, where authentication keys must be updated, and unsuccessful executions can cause the parties to run out of keys.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secure Identification and QKD in the Bounded-Quantum-Storage Model does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secure Identification and QKD in the Bounded-Quantum-Storage Model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure Identification and QKD in the Bounded-Quantum-Storage Model will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-587823

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.