Skip to main content
Log in

Comment on “A novel quantum deniable authentication protocol without entanglement”

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Shi et al. (Quantum Inf Process 14(6):2183–2193, 2015) proposed a novel quantum deniable authentication protocol in which new shared secret keys can be updated timely with the help of a trusted party, and the fact that only the specified receiver could identify the true source of a given message is guaranteed by the new shared secret keys generated in the key update phase. Hence, the core of Shi et al.’s protocol is the key update phase . However, the analysis in this paper shows that there is a bug in the key update phase, which can lead to the failure of updating the shared key. Furthermore, an improved simple method is proposed to mitigate the security weakness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, pp. 175–179 (1984)

  2. Liao, S.K., Yong, H.L., Liu, C., et al.: Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat. Photonics 11, 509–513 (2017)

    Article  Google Scholar 

  3. Cao, H., Ma, W.: (t, n) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9, 1–7 (2017)

    Google Scholar 

  4. Gong, L.H., Song, H.C., He, C.S.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)

    Article  ADS  Google Scholar 

  5. He, Y.F., Ma, W.P.: Three-party quantum secure direct communication against collective noise. Quantum Inf. Process. 16, 252 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  6. Guo, F.Z., Gao, F., Qin, S.J.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process. 12, 2793–2802 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  7. Cao, H., Ma, W.: Multiparty quantum key agreement based on quantum search algorithm. Sci. Rep. 7, 45046 (2017)

    Article  ADS  Google Scholar 

  8. Hillery, M., Ziman, M., Bužek, V.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)

    Article  ADS  Google Scholar 

  9. Jiang, L., He, G., Nie, D.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)

    Article  ADS  Google Scholar 

  10. Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55, 2303–2310 (2016)

    Article  MathSciNet  Google Scholar 

  11. Thapliyal, K., Sharma, R.D., Pathak, A.: Protocols for quantum binary voting. Int. J. Quantum Inf. 15, 1750007 (2017)

    Article  Google Scholar 

  12. Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)

    Article  ADS  Google Scholar 

  13. Barnum, H., Crépeau, C., Gottesman, D., et al.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, pp. 449–458. IEEE (2002)

  14. Bartkiewicz, K., Černoch, A., Lemr, K.: Using quantum routers to implement quantum message authentication and Bell-state manipulation. Phys. Rev. A 90, 022335 (2014)

    Article  ADS  Google Scholar 

  15. Yao, Y., Gao, M., Li, M.: Quantum cloning attacks against PUF-based quantum authentication systems. Quantum Inf. Process. 15, 3311–3325 (2016)

    Article  ADS  MathSciNet  Google Scholar 

  16. Portmann, C.: Quantum authentication with key recycling. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 339–368. Springer, Cham (2017)

    Google Scholar 

  17. Shi, W.M., Zhou, Y.H., Yang, Y.G.: Quantum deniable authentication protocol. Quantum Inf. Process. 13, 1501–1510 (2014)

    Article  ADS  MathSciNet  Google Scholar 

  18. Shi, W.M., Zhang, J.B., Zhou, Y.H.: A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14, 2183–2193 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  19. Shi, W.M., Zhou, Y.H., Yang, Y.G.: A restricted quantum deniable authentication protocol applied in electronic voting system. Optik 142, 9–12 (2017)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Science Foundation of China (Grant Nos. 61373171, 61702007), the National Key R&D Program of China (Grant No. 2017YFB0802400), the 111 Project under (Grant No. B08038), and the Key Project of Science Research of Anhui Province (Grant No. KJ2017A519).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hao Cao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, H., Ma, W. Comment on “A novel quantum deniable authentication protocol without entanglement”. Quantum Inf Process 17, 289 (2018). https://doi.org/10.1007/s11128-018-2062-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-018-2062-z

Keywords

Navigation