中国物理B ›› 2018, Vol. 27 ›› Issue (10): 100308-100308.doi: 10.1088/1674-1056/27/10/100308

• SPECIAL TOPIC—Recent advances in thermoelectric materials and devices • 上一篇    下一篇

Coherent attacks on a practical quantum oblivious transfer protocol

Guang-Ping He(何广平)   

  1. School of Physics, Sun Yat-sen University, Guangzhou 510275, China
  • 收稿日期:2018-04-27 修回日期:2018-07-19 出版日期:2018-10-05 发布日期:2018-10-05
  • 通讯作者: Guang-Ping He E-mail:hegp@mail.sysu.edu.cn

Coherent attacks on a practical quantum oblivious transfer protocol

Guang-Ping He(何广平)   

  1. School of Physics, Sun Yat-sen University, Guangzhou 510275, China
  • Received:2018-04-27 Revised:2018-07-19 Online:2018-10-05 Published:2018-10-05
  • Contact: Guang-Ping He E-mail:hegp@mail.sysu.edu.cn

摘要:

In a recent quantum oblivious transfer protocol proposed by Nagy et al., it was proven that attacks based on individual measurements and 2-qubit entanglement can all be defeated. Later we found that 5-body entanglement-based attacks can break the protocol. Here we further tighten the security bound, by showing that the protocol is insecure against 4-body entanglement-based attacks, while being immune to 3-body entanglement-based attacks. Also, increasing the number of qubits in the protocol is useless for improving its security.

关键词: quantum cryptography, quantum algorithm, quantum oblivious transfer, entanglement

Abstract:

In a recent quantum oblivious transfer protocol proposed by Nagy et al., it was proven that attacks based on individual measurements and 2-qubit entanglement can all be defeated. Later we found that 5-body entanglement-based attacks can break the protocol. Here we further tighten the security bound, by showing that the protocol is insecure against 4-body entanglement-based attacks, while being immune to 3-body entanglement-based attacks. Also, increasing the number of qubits in the protocol is useless for improving its security.

Key words: quantum cryptography, quantum algorithm, quantum oblivious transfer, entanglement

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Ac (Quantum algorithms, protocols, and simulations) 03.65.Ud (Entanglement and quantum nonlocality) 03.67.Hk (Quantum communication)