期刊文献+
共找到178篇文章
< 1 2 9 >
每页显示 20 50 100
Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment 被引量:1
1
作者 Naveed Khan Zhang Jianbiao +2 位作者 Intikhab Ullah Muhammad Salman Pathan Huhnkuk Lim 《Computers, Materials & Continua》 SCIE EI 2023年第4期35-49,共15页
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol... Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment. 展开更多
关键词 LATTICE AUTHENTICATION quantum attack ProVerif
下载PDF
Countermeasure against probabilistic blinding attack in practical quantum key distribution systems 被引量:1
2
作者 钱泳君 李宏伟 +5 位作者 何德勇 银振强 张春梅 陈巍 王双 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期111-115,共5页
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by... In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. 展开更多
关键词 countermeasure bound single-photon detector probabilistic blinding attack quantum key distribution
下载PDF
Security of a practical semi-device-independent quantum key distribution protocol against collective attacks 被引量:1
3
作者 汪洋 鲍皖苏 +2 位作者 李宏伟 周淳 李源 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期256-260,共5页
Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribu- tion (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of... Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribu- tion (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one- way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. 展开更多
关键词 quantum key distribution semi-device-independent collective attacks secret key rate
下载PDF
Attacking a high-dimensional quantum key distribution system with wavelength-dependent beam splitter
4
作者 Ge-Hai Du Hong-Wei Li +1 位作者 Yang Wang Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期87-92,共6页
The unconditional security of quantum key distribution(QKD) can be guaranteed by the nature of quantum physics.Compared with the traditional two-dimensional BB84 QKD protocol, high-dimensional quantum key distribution... The unconditional security of quantum key distribution(QKD) can be guaranteed by the nature of quantum physics.Compared with the traditional two-dimensional BB84 QKD protocol, high-dimensional quantum key distribution(HDQKD) can be applied to generate much more secret key.Nonetheless, practical imperfections in realistic systems can be exploited by the third party to eavesdrop the secret key.The practical beam splitter has a correlation with wavelength,where different wavelengths have different coupling ratios.Using this property, we propose a wavelength-dependent attack towards time-bin high-dimensional QKD system.What is more, we demonstrate that this attacking protocol can be applied to arbitrary d-dimensional QKD system, and higher-dimensional QKD system is more vulnerable to this attacking strategy. 展开更多
关键词 HIGH-DIMENSIONAL quantum key distribution beam SPLITTER wavelength attack
下载PDF
Improving continuous-variable quantum key distribution under local oscillator intensity attack using entanglement in the middle
5
作者 杨芳丽 郭迎 +2 位作者 石金晶 王焕礼 潘矜矜 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期54-60,共7页
A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy A... A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator (LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection. 展开更多
关键词 continuous-variable quantum key distribution local oscillator intensity attack entanglement in the middle
下载PDF
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 被引量:1
6
作者 何广强 朱思维 +1 位作者 郭红斌 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1263-1268,共6页
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon... For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 展开更多
关键词 quantum key distribution two-mode squeezed states optimal beam splitter attack
下载PDF
Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ 被引量:2
7
作者 Tairong Shi Chenhui Jin Jie Guan 《China Communications》 SCIE CSCD 2018年第2期46-53,共8页
AEZ is an AES-based authenticated encryption submitted to the ongoing CAESAR competition and was presented at Eurocrypt2015 with AEZ v3. There are three models for AEZ, AEZ-core, AEZ-tiny and AEZ-prf. In this paper, w... AEZ is an AES-based authenticated encryption submitted to the ongoing CAESAR competition and was presented at Eurocrypt2015 with AEZ v3. There are three models for AEZ, AEZ-core, AEZ-tiny and AEZ-prf. In this paper, we consider the security of AEZprf for AEZ v4.2, the latest version of AEZ.Our major finding is a collision of any 256-bit associated data for AES-prf. Then we launch collision attacks in a quantum setting and a classical setting respectively under different assumptions. In the quantum setting, by Simon's quantum algorithm, we amount a forgery with O(n) quantum superposition queries and an overwhelming probability close to 1.In the classical setting, one with the key of AEZ-prf can also construct the forgeries. Our results show that the AEZ-prf models of AEZ v4.2 is not secure in both the quantum setting and classical world. Furthermore, our results can also be applied to AEZ v3, which has been published on Eurocrypt 2015. As far as we know, no cryptanalysis of AEZ v4.2 has been published so far. 展开更多
关键词 CAESAR competition authen-ticated encryption AEZ collision attacks quantum attacks
下载PDF
Quantum key distribution series network protocol with M-classical Bobs 被引量:3
8
作者 张现周 公伟贵 +2 位作者 谭勇刚 任振忠 郭笑天 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第6期2143-2148,共6页
Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one qu... Secure key distribution among classical parties is impossible both between two parties and in a network. In this paper, we present a quantum key distribution (QKD) protocol to distribute secure key bits among one quantum party and numerous classical parties who have no quantum capacity. We prove that our protocol is completely robust, i.e., any eavesdropping attack should be detected with nonzero probability. Our calculations show that our protocol may be secure against Eve's symmetrically individual attack. 展开更多
关键词 quantum key distribution symmetrical attack network protocol
下载PDF
Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution 被引量:2
9
作者 赵峰 傅明星 +1 位作者 路轶群 刘颂豪 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第11期3402-3406,共5页
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at... The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented. 展开更多
关键词 multi-photon pulses differential-phase-shift quantum key distribution PNS attack BS attack
下载PDF
Dynamic quantum secret sharing protocol based on two-particle transform of Bell states 被引量:4
10
作者 Yu-Tao Du Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期118-123,共6页
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a nove... To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states. 展开更多
关键词 quantum secret sharing two-particle transform of Bell states attack DYNAMIC
下载PDF
Round-robin differential quadrature phase-shift quantum key distribution
11
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang Mu-Sheng Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
下载PDF
Enhanced arbitrated quantum signature scheme using Bell states
12
作者 王朝 刘建伟 尚涛 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第6期66-73,共8页
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept- resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a maliciou... We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept- resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may success- fully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme. 展开更多
关键词 arbitrated quantum signature intercept-resend attack denial-of-service attack
下载PDF
Fault tolerant controlled quantum dialogue against collective noise 被引量:3
13
作者 Li-Wei Chang Yu-Qing Zhang +2 位作者 Xiao-Xiong Tian Yu-Hua Qian Shi-Hui Zheng 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第1期128-139,共12页
Quantum system is inevitably affected by the external environment in the real world.Two controlled quantum dialogue protocols are put forward based on logicalχ-type states under collective noise environment.One is ag... Quantum system is inevitably affected by the external environment in the real world.Two controlled quantum dialogue protocols are put forward based on logicalχ-type states under collective noise environment.One is against collectivedephasing noise,while the other is against collective-rotation noise.Compared with existing protocols,there exist several outstanding advantages in our proposed protocols:Firstly,theχ-type state is utilized as quantum channels,it possesses better entanglement properties than GHZ state,W state as well as cluster state,which make it difficult to be destroyed by local operations.Secondly,two kinds of logicalχ-type states are constructed by us in theory,which can be perfectly immune to the effects of collective noise.Thirdly,the controller can be offline after quantum distribution and permission announcement,without waiting for all the participants to complete the information coding.Fourthly,the security analysis illuminates that our protocols can not only be free from the information leakage,but also resist against the interceptand-resend attack,the entanglement-and-measure attack,the modification attack,the conspiring attack,and especially the dishonest controller’s attacks. 展开更多
关键词 controlled quantum dialogue collective noise logicalχ-type state dishonest controller’s attacks
下载PDF
Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad 被引量:2
14
作者 刘志昊 陈汉武 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第8期59-64,共6页
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security iss... The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol.Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. 展开更多
关键词 CRYPTANALYSIS quantum broadcast communication information leakage intercept-measure-resendattack CNOT-operation attack
下载PDF
Finite-size analysis of continuous-variable quantum key distribution with entanglement in the middle 被引量:1
15
作者 Ying Guo Yu Su +2 位作者 Jian Zhou Ling Zhang Duan Huang 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第1期232-239,共8页
Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it i... Continuous-variable quantum key distribution(CVQKD) protocols with entanglement in the middle(EM) enable long maximal transmission distances for quantum communications. For the security analysis of the protocols, it is usually assumed that Eve performs collective Gaussian attacks and there is a lack of finite-size analysis of the protocols. However,in this paper we consider the finite-size regime of the EM-based CVQKD protocols by exposing the protocol to collective attacks and coherent attacks. We differentiate between the collective attacks and the coherent attacks while comparing asymptotic key rate and the key rate in the finite-size scenarios. Moreover, both symmetric and asymmetric configurations are collated in a contrastive analysis. As expected, the derived results in the finite-size scenarios are less useful than those acquired in the asymptotic regime. Nevertheless, we find that CVQKD with entanglement in the middle is capable of providing fully secure secret keys taking the finite-size effects into account with transmission distances of more than 30 km. 展开更多
关键词 continuous-variable quantum key distribution ENTANGLEMENT in the middle FINITE-SIZE coherent attack
下载PDF
多维动态网络的密钥认证数学建模与仿真
16
作者 顾银鲁 解海燕 钟小莉 《计算机仿真》 2024年第4期284-288,共5页
多维动态网络在密钥认证过程中,若加密的密钥安全程度较低,则会被量子计算机解码,使传输的隐私数据出现泄露。为有效提升密钥的安全认证效果,提出量子攻击下多维动态网络密钥认证数学建模方法。方法建立用于多维动态网络的密钥认证模型... 多维动态网络在密钥认证过程中,若加密的密钥安全程度较低,则会被量子计算机解码,使传输的隐私数据出现泄露。为有效提升密钥的安全认证效果,提出量子攻击下多维动态网络密钥认证数学建模方法。方法建立用于多维动态网络的密钥认证模型,在建立的认证模型中,对网络中待传输数据实施冗余清洗,并使用高级加密标准(Advanced Encryption Standard,AES)算法生成密钥对待传输数据初次加密;添加一串噪声数据在加密数据中,并对其二次加密,进一步提升数据的抗量子攻击性能,建立多维动态网络的安全密钥传输模型,完成密钥的安全传输。根据解密方法结合密钥对数据安全解密,完成多维动态网络密钥的安全认证。实验结果表明,利用上述方法开展网络密钥认证时,加解密时间短,认证准确率在85%以上,且抗量子攻击能力强。 展开更多
关键词 量子攻击 多维动态网络 密钥认证 数学模型
下载PDF
对称密码体制的量子攻击
17
作者 冯晓宁 吴洪宇 《应用科学学报》 CAS CSCD 北大核心 2024年第1期39-52,共14页
该文梳理了近年来量子攻击在对称密码体制的研究脉络,分析了主流攻击方法的研究趋势与各文献之间的关系,并将主流攻击方法分为量子周期攻击、Grover算法相关攻击、量子差分攻击3类,分别介绍了具有代表性的攻击方法,呈现了各攻击方法的... 该文梳理了近年来量子攻击在对称密码体制的研究脉络,分析了主流攻击方法的研究趋势与各文献之间的关系,并将主流攻击方法分为量子周期攻击、Grover算法相关攻击、量子差分攻击3类,分别介绍了具有代表性的攻击方法,呈现了各攻击方法的核心思想。立足于现有的攻击方案,展望了这一领域可能会出现的热门研究方向。 展开更多
关键词 密码分析 量子算法 对称密码体制 量子攻击
下载PDF
Hardware Security for IoT in the Quantum Era: Survey and Challenges
18
作者 Doudou Dione Boly Seck +3 位作者 Idy Diop Pierre-Louis Cayrel Demba Faye Ibrahima Gueye 《Journal of Information Security》 2023年第4期227-249,共23页
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s... The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed. 展开更多
关键词 IOT Hardware Security Side-Channel attacks Post-quantum Cryptography NIST
下载PDF
基于Grover量子搜索算法的MD5碰撞攻击模型
19
作者 张兴兰 李登祥 《信息网络安全》 CSCD 北大核心 2024年第8期1210-1219,共10页
量子计算天然的并行性使其在密码学领域具有巨大潜力,而在信息安全领域,Hash函数的安全性至关重要。因此,后量子密码学概念的提出使得Hash函数在后量子时代的研究价值凸显。文章提出了一种基于Grover量子搜索算法的MD5碰撞攻击模型,运... 量子计算天然的并行性使其在密码学领域具有巨大潜力,而在信息安全领域,Hash函数的安全性至关重要。因此,后量子密码学概念的提出使得Hash函数在后量子时代的研究价值凸显。文章提出了一种基于Grover量子搜索算法的MD5碰撞攻击模型,运用模差分分析法,通过对输入的量子叠加态进行约束搜索以找到满足碰撞条件的目标态,再根据差分构造出与之相碰撞的消息。此外,文章探讨了量子搜索算法中的迭代过程及其关键操作,设计了相应的Oracle黑盒的量子线路,并对其进行性能分析,结果表明,与经典算法相比,该模型显著降低了攻击的计算复杂度,为后量子密码时期Hash函数的研究提供了新的思路和方法,也为防御此类攻击提供了有益参考。 展开更多
关键词 量子计算 碰撞攻击 GROVER量子搜索算法 MD5算法
下载PDF
Practical Security of the Continuous-Variable Quantum Key Distribution with Locally-Generated Local Oscillators
20
作者 Biao Huang Yongjun Zhu +2 位作者 Pu Tang Yongmei Huang Zhenming Peng 《Journal of Applied Mathematics and Physics》 2019年第11期2751-2759,共9页
Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecu... Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecure quantum channel. In this paper, we propose a method of phase attack on reference pulses of the LLO-CVQKD with time-multiplexing. Under this phase attack, the phase drifts of reference pulses are manipulated by eavesdroppers, and then the phase compensation error is increased. Consequently, the secret key rate is reduced due to the imperfect phase compensation for quantum signals. Based on the noise model of imperfect phase compensation, the practical security of LLO-CVQKD under phase attack is analyzed. The simulation results show that the practical security is reduced due to the phase attack, yet it is still tight when system parameters are estimated by training signals. 展开更多
关键词 Continuous-Variable quantum Key Distribution Local Oscillator Reference Pulse PRACTICAL SECURITY Phase attack
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部