2015
DOI: 10.1007/s11432-015-5413-8
|View full text |Cite
|
Sign up to set email alerts
|

Controlling the key by choosing the detection bits in quantum cryptographic protocols

Abstract: Eavesdropping detection is an indispensable process of most quantum cryptographic protocols. By publishing and comparing part of the shared bits, called as detection bits, the participants can check whether there exists an eavesdropper. Generally, the detection bits are chosen randomly. Consequently, the secret bits, i.e., the rest bits, are also random. Then, what if the detection bits are chosen non-randomly? Can the participant who chooses the detection bits make the secret bits to be a predetermined string… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…The inherent properties connect it directly with cryptographic characteristics of confusion and diffusion, which is presented in Shannon's works [15]. High-dimensional chaotic system is more reliable to design secure image encryption scheme because of its high complexity [6,11,12,5,13].…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The inherent properties connect it directly with cryptographic characteristics of confusion and diffusion, which is presented in Shannon's works [15]. High-dimensional chaotic system is more reliable to design secure image encryption scheme because of its high complexity [6,11,12,5,13].…”
Section: Previous Workmentioning
confidence: 99%
“…The inherent properties connect it directly with cryptographic characteristics of confusion and diffusion, which is presented in Shannon's works [15]. High-dimensional chaotic system is more reliable to design secure image encryption scheme because of its high complexity [6,11,12,5,13]. Some cryptosystems, which are based on a low-dimensional chaotic map, have obvious drawbacks, such as short period and small key space [23].…”
Section: Previous Workmentioning
confidence: 99%
“…collusive attacks? [35] CGT Yes Yes [36] CGT Yes Yes [37] CGT Yes Yes [38] TT CT Yes No [47], if the number of dishonest participants' detect bits is larger than that of the final key, they can always totally predetermine the key. Is it possible to design a fair CT-MQKA protocol?…”
Section: Protocolmentioning
confidence: 99%
“…[38] is called the tree-type MQKA. In fact, the tree-type QKA protocol is sensitive to a special attack called detection bits chosen attack [47] which we will briefly introduce in conclusions.…”
Section: Introductionmentioning
confidence: 99%