Abstract
Shi et al. (Quantum Inf Process 14(6):2183–2193, 2015) proposed a novel quantum deniable authentication protocol in which new shared secret keys can be updated timely with the help of a trusted party, and the fact that only the specified receiver could identify the true source of a given message is guaranteed by the new shared secret keys generated in the key update phase. Hence, the core of Shi et al.’s protocol is the key update phase . However, the analysis in this paper shows that there is a bug in the key update phase, which can lead to the failure of updating the shared key. Furthermore, an improved simple method is proposed to mitigate the security weakness.
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, pp. 175–179 (1984)
Liao, S.K., Yong, H.L., Liu, C., et al.: Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat. Photonics 11, 509–513 (2017)
Cao, H., Ma, W.: (t, n) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9, 1–7 (2017)
Gong, L.H., Song, H.C., He, C.S.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)
He, Y.F., Ma, W.P.: Three-party quantum secure direct communication against collective noise. Quantum Inf. Process. 16, 252 (2017)
Guo, F.Z., Gao, F., Qin, S.J.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process. 12, 2793–2802 (2013)
Cao, H., Ma, W.: Multiparty quantum key agreement based on quantum search algorithm. Sci. Rep. 7, 45046 (2017)
Hillery, M., Ziman, M., Bužek, V.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75–81 (2006)
Jiang, L., He, G., Nie, D.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)
Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55, 2303–2310 (2016)
Thapliyal, K., Sharma, R.D., Pathak, A.: Protocols for quantum binary voting. Int. J. Quantum Inf. 15, 1750007 (2017)
Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)
Barnum, H., Crépeau, C., Gottesman, D., et al.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, pp. 449–458. IEEE (2002)
Bartkiewicz, K., Černoch, A., Lemr, K.: Using quantum routers to implement quantum message authentication and Bell-state manipulation. Phys. Rev. A 90, 022335 (2014)
Yao, Y., Gao, M., Li, M.: Quantum cloning attacks against PUF-based quantum authentication systems. Quantum Inf. Process. 15, 3311–3325 (2016)
Portmann, C.: Quantum authentication with key recycling. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 339–368. Springer, Cham (2017)
Shi, W.M., Zhou, Y.H., Yang, Y.G.: Quantum deniable authentication protocol. Quantum Inf. Process. 13, 1501–1510 (2014)
Shi, W.M., Zhang, J.B., Zhou, Y.H.: A novel quantum deniable authentication protocol without entanglement. Quantum Inf. Process. 14, 2183–2193 (2015)
Shi, W.M., Zhou, Y.H., Yang, Y.G.: A restricted quantum deniable authentication protocol applied in electronic voting system. Optik 142, 9–12 (2017)
Acknowledgements
This work is partially supported by the National Science Foundation of China (Grant Nos. 61373171, 61702007), the National Key R&D Program of China (Grant No. 2017YFB0802400), the 111 Project under (Grant No. B08038), and the Key Project of Science Research of Anhui Province (Grant No. KJ2017A519).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cao, H., Ma, W. Comment on “A novel quantum deniable authentication protocol without entanglement”. Quantum Inf Process 17, 289 (2018). https://doi.org/10.1007/s11128-018-2062-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-018-2062-z