Please wait a minute...
Chin. Phys. B, 2016, Vol. 25(8): 080308    DOI: 10.1088/1674-1056/25/8/080308
GENERAL Prev   Next  

Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad

Zhi-Hao Liu(刘志昊)1,2,3, Han-Wu Chen(陈汉武)1,2
1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China;
2 Key Laboratory of Computer Network and Information Integration(Southeast University), Ministry of Education, Nanjing 211189, China;
3 Center for Quantum Computation and Intelligent Systems, Faculty of Engineering and Information Technology, University of Technology Sydney, NSW 2007, Australia
Abstract  The security of quantum broadcast communication (QBC) and authentication protocol based on Greenberger-Horne-Zeilinger (GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol. Firstly, an external eavesdropper can take the intercept-measure-resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept-measure-resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one.
Keywords:  cryptanalysis      quantum broadcast communication      information leakage      intercept-measure-resend attack      CNOT-operation attack  
Received:  18 November 2015      Revised:  31 March 2016      Accepted manuscript online: 
PACS:  03.67.Dd (Quantum cryptography and communication security)  
  03.67.Hk (Quantum communication)  
  03.67.-a (Quantum information)  
  03.65.Ud (Entanglement and quantum nonlocality)  
Fund: Project supported by the National Natural Science Foundation of China (Grant Nos. 61502101 and 61170321), the Natural Science Foundation of Jiangsu Province, China (Grant No. BK20140651), the Research Fund for the Doctoral Program of Higher Education, China (Grant No. 20110092110024), and the Project Funded by PAPD and CICAEET.
Corresponding Authors:  Han-Wu Chen     E-mail:  lzh@seu.edu.cn

Cite this article: 

Zhi-Hao Liu(刘志昊), Han-Wu Chen(陈汉武) Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad 2016 Chin. Phys. B 25 080308

[1] Bennett C H and Brassard G 1984 IEEE International Conference on Computers, Systems & Signal Processing, December 10-12, Bangalore, India, p. 175
[2] Ekert A K 1991 Phys. Rev. Lett. 67 661
[3] Bennett C H 1992 Phys. Rev. Lett. 68 3121
[4] Bennett C H, Brassard G and Mermin N D 1992 Phys. Rev. Lett. 68 557
[5] Bruβ D 1998 Phys. Rev. Lett. 81 3018
[6] Wang X B 2004 Phys. Rev. Lett. 92 077902
[7] Lo H K, Ma X F and Chen K 2005 Phys. Rev. Lett. 94 230504
[8] Boyer M, Kenigsberg D and Mor T 2007 Phys. Rev. Lett. 99 140501
[9] Noh T G 2009 Phys. Rev. Lett. 103 230501
[10] Tang Y L, Yin H L, Chen S J, Liu Y, Zhang W J, Jiang X, Zhang L, Wang J, You L X, Guan J Y, Yang D X, Wang Z, Liang H, Zhang Z, Zhou N, Ma X F, Chen T Y, Zhang Q and Pan J W 2014 Phys. Rev. Lett. 113 190501
[11] Vazirani U and Vidick T 2014 Phys. Rev. Lett. 113 140501
[12] Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317
[13] Deng F G and Long G L 2004 Phys. Rev. A 69 052319
[14] Lucamarini M and Mancini S 2005 Phys. Rev. Lett. 94 140501
[15] Wang C, Deng F G, Li Y S, Liu X S and Long G L 2005 Phys. Rev. A 71 044305
[16] Wang C, Deng F G and Long G L 2005 Opt. Commun. 253 15
[17] Deng F G, Li X H, Li C Y, Zhou P and Zhou H Y 2006 Phys. Lett. A 359
[18] Long G L, Deng F G, Wang C and Li X H 2007 Front. Phys. China 2 251
[19] Lin S, Wen Q Y, Gao F and Zhu F C 2008 Phys. Rev. A 78 064304
[20] Dong L, Xiu X M, Gao Y J and Chi F 2009 Opt. Commun. 282 1688
[21] Cao W F, Yang Y G and Wen Q Y 2010 Sci. China:Phys. Mech. Astron. 53 1271
[22] Gu B, Zhang C Y, Cheng G S and Huang Y G 2011 Sci. China:Phys. Mech. Astron. 54 942
[23] Liu Z H, Chen H W, Liu W J, Xu J, Wang D and Li Z Q 2013 Quantum Infor. Process. 12 587
[24] Hong C H, Heo J, Lim J I and Yang H J 2014 Chin. Phys. B 23 090309
[25] Li X H 2015 Acta Phys. Sin. 64 0160307 (in Chinese)
[26] Mi S C, Wang T J, Jin G S and Wang C 2015 IEEE Photon. J. 7 7600108
[27] Beige A, Englert B G, Kurtsiefer C and Weinfurter H 2002 Acta Phys. Pol. A 101 357
[28] Yan F L and Zhang X Q 2004 Eur. Phys. J. B 41 75
[29] Man Z X, Zhang Z J and Li Y 2005 Chin. Phys. Lett. 22 18
[30] Li X H, Deng F G, Li C Y, Liang Y J, Zhou P and Zhou H Y 2006 J. Korean Phys. Soc. 49 1354
[31] Man Z X, Xia Y J and An N B 2006 J. Phys. B:At. Mol. Opt. Phys. 39 3855
[32] Xiu X M, Dong H K, Dong L, Gao Y J and Chi F 2009 Opt. Commun. 282 2457
[33] Quan D X, Pei C X, Liu D and Zhao N 2010 Acta Phys. Sin. 59 2493 (in Chinese)
[34] Liu Z H, Chen H W, Liu W J, Xu J and Li Z Q 2012 Sci. China-Inf. Sci. 55 360
[35] Liu Z H, Chen H W, Wang D and Xue X L 2014 Int. J. Theor. Phys. 53 2118
[36] Li X H, Li C Y, Deng F G, Zhou P, Liang Y J and Zhou H Y 2007 Chin. Phys. Lett. 24 23
[37] Wang J, Zhang Q and Tang C J 2007 Chin. Phys. 16 1868
[38] Yang Y G, Wang Y H and Wen Q Y 2010 Chin. Phys. B 19 070304
[39] Chang Y, Xu C X, Zhang S B and Yan L L 2014 Chin. Phys. B 23 010305
[1] Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad
Ya Cao(曹雅), Fei Gao(高飞). Chin. Phys. B, 2016, 25(11): 110305.
[2] Quantum broadcast communication and authentication protocol with a quantum one-time pad
Chang Yan (昌燕), Xu Chun-Xiang (许春香), Zhang Shi-Bin (张仕斌), Yan Li-Li (闫丽丽). Chin. Phys. B, 2014, 23(1): 010305.
[3] Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices
Wang Xing-Yuan (王兴元), Liu Lin-Tao (刘林涛). Chin. Phys. B, 2013, 22(5): 050503.
[4] Cryptanalysis of an ergodic chaotic encryption algorithm
Wang Xing-Yuan(王兴元), Xie Yi-Xin(谢旖欣), and Qin Xue(秦学) . Chin. Phys. B, 2012, 21(4): 040504.
[5] Quantum broadcast communication with authentication
Yang Yu-Guang(杨宇光), Wang Ye-Hong(王叶红), and Wen Qiao-Yan(温巧燕). Chin. Phys. B, 2010, 19(7): 070304.
[6] Improving the security of secure deterministic communication scheme based on quantum remote state preparation
Qin Su-Juan(秦素娟) and Wen Qiao-Yan(温巧燕). Chin. Phys. B, 2010, 19(2): 020310.
[7] Enhancing the security of quantum secret sharing against multiphoton attack
Zhang Bin-Bin(张彬彬), Wang Da-Qing(王大庆), Huang Shan-Shan(黄珊珊), and Liu Yu(刘玉). Chin. Phys. B, 2009, 18(6): 2149-2153.
[8] Teleportation attack on the QSDC protocol with a random basis and order
Gao Fei(高飞), Wen Qiao-Yan(温巧燕), and Zhu Fu-Chen(朱甫臣). Chin. Phys. B, 2008, 17(9): 3189-3193.
[9] Quantum broadcast communication
Wang Jian(王剑), Zhang Quan(张权), and Tang Chao-Jing(唐朝京). Chin. Phys. B, 2007, 16(7): 1868-1877.
No Suggested Reading articles found!