† Corresponding author. E-mail:
‡ Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. 61502101 and 61170321), the Natural Science Foundation of Jiangsu Province, China (Grant No. BK20140651), the Research Fund for the Doctoral Program of Higher Education, China (Grant No. 20110092110024), and the Project Funded by PAPD and CICAEET.
The security of quantum broadcast communication (QBC) and authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol. Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other’s definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one.
As one of the most developed branches of quantum cryptography, quantum key distribution (QKD) discusses the problem of how to distribute a secret key between two remote users with the quantum manner. The pioneers Bennett and Brassard[1] designed the first QKD protocol in 1984, where four nonorthogonal single-photon states were used. Afterward, Ekert[2] put forward another novel QKD protocol by using Einstein–Podolsky–Rosen (EPR) pairs in 1991, in which Bell inequality was for the first time used to evaluate the security of the quantum channel. In the next year, Bennett et al.[3] proposed a new QKD protocol based on two nonorthogonal single-photon states with unconditional security. After that, QKD[4–11] received much attention and fruitful achievement in both theoretical and experimental aspects. In recent years, another branch of quantum cryptography called quantum direct communication (QDC) was put forward. Different from QKD, QDC allows the sender to transmit directly the secret or the deterministic key (instead of a random key) to the receiver in a deterministic and secure manner. Compared with that in QKD, the security demands in QDC are more rigorous because the information transmitted is the meaningful secret instead of a random key, which cannot be eavesdropped. This means the information cannot be leaked out whether the eavesdropper would be discovered or not in QDC. In general, QDC can be divided into two categories: quantum secure direct communication (QSDC)[12–26] and deterministic secure quantum communication (DSQC).[27–35] The difference between QSDC and DSQC is that there are some classical bits communicated to assist the receiver to decrypt the secret in DSQC, while in QSDC there is not. Quantum broadcast communication (QBC)[36–38] as a special kind of QDC was put forward several years ago, which involves a sender and multiple receivers. For QBC, a sender broadcasts a secret message to a set of receivers with the quantum manner, and every receiver can get the same message.
Recently, Chang et al.[39] put forward a novel QBC and authentication protocol with a quantum one-time pad based on the Greenberger–Horne–Zeilinger (GHZ) state. For the sake of convenience, we refer to this QBC protocol as the QBC-CXZY protocol later. It was shown that one bit of information could be broadcasted from the sender to the receivers at the cost of a GHZ state consumed. The classical exclusive-or (XOR) operation serving as a one-time-pad was used to forbid the eavesdroppers to eavesdrop on the secret transmitted by the sender. Eavesdropping detection and identity authentication were implemented at the same time based on previously shared identity strings. It was claimed that the identity strings could be reused with unconditional security and no hash function or local unitary operation was used. However, if considering this protocol carefully, one can find that it in fact has some security issues. An eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on some information of the identity strings of the receivers and the secret message without being detected. Moreover, one receiver can take the intercept–measure–resend attack more efficiently than the external eavesdropper to eavesdrop on the other’s identity string without being detected. As for the multi-party QBC-CXZY protocol, the attack efficiency increases with the increase of the number of users. In the following context, we will cryptanalyze the QBC-CXZY protocol from the viewpoint of information theory.
Suppose that the sender Alice wants to broadcast her secret message to two receivers Bob and Charlie. Bob and Charlie have the secret N-bit strings IDB and IDC representing their identities respectively. Alice shares IDB and IDC with Bob and Charlie respectively. The QBC-CXZY protocol consists of the following steps.
In the QBC-CXZY protocol, there are some obvious features. Firstly, the security of the protocol completely depends on the security of the identities, because eavesdropping check and identity authentication are implemented at the same time. Secondly, only Z-basis measurement is used to decrypt the secret message, so if an eavesdropper (Eve) happens to make a Z-basis measurement on a transmitted particle which comes from a GHZ state, there is no error introduced.
Now we consider the situation that an external eavesdropper (Eve) eavesdrops on some information of the identity strings of the receivers (IDB and IDC) and the secret message without bringing any error. The attack strategy is described as follows.
To understand the above rules more unambiguously, we can refer to Table 1. Now we will take the 10th row of Table
Without loss of generality, we assume that the probabilities that classical bits 0 and 1 occur are identical in every identity string. It means that states |0〉, |1〉, |+〉, and |−〉 have the same probabilities to be prepared for the decoy states. In addition, it is easily known that if measuring the particle 2 (3) from a GHZ state, one has the identical probability to get the results |0〉 and |1〉. This means in Table
It can be easily found that Eve has the probability of 5/16 to obtain the bits of IDB(IDC) definitely. Furthermore, we can calculate the average quantity of information Eve can gain about every bit of IDB (denoting by IEve→IDB).
From Table
So far, we have put forward an attack strategy for an external eavesdropper to get some information of IDB and IDC and the secret message M without being detected.
If a receiver acts as an eavesdropper to eavesdrop on the other’s identity string, his attack obviously is more efficient because he has more resources and knowledge than the external eavesdropper. Here we take Bob as an example to eavesdrop on Charlie’s identity string IDC. The situation that Charlie eavesdrops on Bob’s identity string IDB is the same. The attack strategy is described as follows.
To understand the above rules more unambiguously, we can refer to Table
Without loss of generality, we assume again that the probabilities that classical bits 0 and 1 occur are identical in every identity string. It means that states |0〉, |1〉, |+〉, and |−〉 have the same probabilities to be prepared for the decoy states. In addition, it is easily known that if measuring the particle 2 (3) from a GHZ state with Z-basis, one has the identical probability to get results |0〉 and |1〉. This means in Table
From Table
As described above, Eve can make an intercept–measure–resend attack strategy to attack every particle labeled even in each traveling sequence. Actually, Eve can exploit an alternative strategy to attack the QBC-CXZY protocol (we call it the CNOT-operation attack). The concrete steps are as follows. Eve prepares an ancilla sequence in which each ancilla initially stays in |0〉. When a GHZ particle labeled even passes by, she performs a CNOT operation on this particle and an ancilla with the particle as the control qubit and the ancilla as the target, where
As for the multi-party QBC-CXZY protocol, an external eavesdropper can use the same attack strategy to eavesdrop on the receivers’ identity strings and the secret. The attack efficiency increases with the increase of the number of users. Now we will explain the reason in the following. For any i (2 ≤ i ≤ n), according to the knowledge of information theory, we have
Similarly, the following inequalities hold.
The reason why an external eavesdropper or an inner user can successfully make an intercept–measure–resend attack is that the identity strings of the receivers are used not only to prepare the decoy particles but also to determine how the decoy particles are mixed into the information carrier particles. That is to say, the identity strings are repeatedly used. This is not allowed in secure communication. Whether the particles labeled even in every traveling sequence are decoy particles or information carrier particles, they all will be measured with Z-basis according to the rules that the decoy particles are prepared and they are inserted into the information carrier particles. So Eve can use this drawback to make an attack without bringing any error. Therefore, to improve the QBC-CXZY protocol, every identity string should be used only once. So, Steps 3 and 4 of the QBC-CXZY protocol are changed as follows.
Note that, before Alice, Bob, and Charlie start a new communication, they will probably have to update the identity strings.
Now if an external eavesdropper or an inner receiver still exploits the intercept–measure–resend attack strategy to attack the particles labeled even in every traveling sequence, she (he) will introduce some errors. This is because the particles labeled even in each traveling sequence are not always staying in Z-basis or measured by the corresponding receiver with Z-basis.
In summary, we find that there are some security issues about the QBC-CXZY protocol. An eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on some information of the identity strings of the receivers and the secret message by measuring the particles labeled even in every traveling sequence with Z-basis without bringing any error. The reason why Eve can use this strategy to successfully attack is that whether the particles labeled even are decoy particles or information carrier particles, they all will be measured with Z-basis. This is really a serious drawback. Of course, an inner receiver can also take the intercept–measure–resend attack more efficiently than the external eavesdropper to eavesdrop on the other’s identity string without being detected. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC-CXZY protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC-CXZY protocol is improved to a secure one. In a word, more attention should be paid to the security of the quantum secure communication in order to design really secure quantum communication protocols.
1 | |
2 | |
3 | |
4 | |
5 | |
6 | |
7 | |
8 | |
9 | |
10 | |
11 | |
12 | |
13 | |
14 | |
15 | |
16 | |
17 | |
18 | |
19 | |
20 | |
21 | |
22 | |
23 | |
24 | |
25 | |
26 | |
27 | |
28 | |
29 | |
30 | |
31 | |
32 | |
33 | |
34 | |
35 | |
36 | |
37 | |
38 | |
39 |