This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to ...This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT(CNOT)extraction attack.A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.展开更多
基金supported by the Research Center of Quantum Communication and Security,National Cheng Kung University,Taiwan,China (Grant No. D100-36002)
文摘This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys.This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT(CNOT)extraction attack.A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.