Home  /  Entropy  /  Vol: 20 Núm: 7 Par: July (2018)  /  Article
ARTICLE
TITLE

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

SUMMARY

A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, “classical Alice with a controllable mirror” (the “Mirror protocol”), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the “simplified Mirror protocol”) to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness.

 Articles related

I. F. Makovska, T. M. Krupinina, V. V. Nedosekov, T. M. Tsarenko, Y. A. Novohatniy, A. S. Fahrion    

Ukraine remains the only country in Europe where rabies is widespread among animals and humans. Annually there are about 1,600 rabies cases in animals in Ukraine and sporadic cases in humans have been registered despite the conducting of preventive measu... see more


Mariya Afshari Rad,Mohammad Salimi Khorshidi    

Today, many countries are looking for missile strikes to achieve their goals. To optimize ballistic missile defense, missile defense centers identify potential launch points for enemy missiles to anticipate enemy attacks to reduce potential damage. One o... see more



Ramamurthi Deeptha,Rajeswari Mukesh    

Single sign-on (SSO) is an emerging and more secure authentication mechanism that enables an authorized user with a single username/password to be authenticated by many service providers in a distributed network system. The existing technique used SSO sc... see more


Suleyman Kardas,Serkan Celik,Mehmet Sariyuce,Albert Levi    

Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, ... see more