Abstract
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
Similar content being viewed by others
Notes
Secure communication based on quantum cryptography.
Quantum key distribution.
Quantum secret sharing.
Quantum identity authentication.
Quantum digital signature.
Quantum secure direct communication.
One-time-pad.
References
C.H. Bennett, G.Q. Brassard, Cryptography: public key distribution and coin tossing, in Proc. IEEE Conf. Computers Systems and Signal Processing (Bangalore, India) (IEEE, New York, 1984), p. 175 (December 1019)
P.W. Shor, J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)
M. Peev, C. Pacher, R. Allaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J.F. Dynes, S. Fasel, The SECOQC quantum key distribution network in Vienna. New J. Phys. 11(7), 075001 (2009)
P. Schartner, C. Kollmitzer, Quantum-cryptographic networks from a prototype to the Citizen. Applied Quantum Cryptography, Springer, Berlin, Heidelberg, pp 173–184 (2010)
C. Kollmitzer, C. Moesslacher, The Ring of Trust Model. Applied Quantum Cryptography, Springer, Berlin, Heidelberg, pp 185–210 (2010)
Y. Chen, P.K. Verma, S. Kak, Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. Secur. Commun. Netw. 2(6), 546–554 (2009)
W.P. Schleich, K.S. Ranade, C. Anton, M. Arndt, M. Aspelmeyer, M. Bayer, G. Berg, T. Calarco, H. Fuchs, E. Giacobino, M. Grassl, Quantum technology: from research to application. Appl. Phys. B 122(5), 130 (2016)
M. Zwerger, H.J. Briegel, W. Dr, Measurement-based quantum communication. Appl. Phys. B 122(3), 50 (2016)
M. Hillery, V. Buzek, A. Berthiaume, Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)
H. Barnum, C. Crpeau, D. Gottesman, A. Smith, A. Tapp, Authentication of quantum messages. In Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE Symposium on IEEE (2002), pp. 449–458
D. Gottesman, I. Chuang, Quantum digital signatures. arXiv preprint quant-ph/0105032 (2001)
G.L. Long, X.S. Liu, Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)
F.G. Deng, G.L. Long, Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)
Y.H. Chou, G.J. Zeng, F.J. Lin, C.Y. Chen, H.C. Chao, Quantum secure communication network protocol with entangled photons for mobile communications. Mobile Netw. Appl. 19(1), 121–130 (2014)
G. Gao, Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications. Phys. Scr. 89(12), 125102 (2014)
T. Hwang, Y.P. Luo, C.W. Yang, T.H. Lin, Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants. Quantum inform. Process. 13(4), 925–933 (2014)
Y.Y. Yang, A quantum secure direct communication protocol without quantum memories. Int. J. Theor. Phys. D 53(7), 2216–2221 (2014)
Y. Chang, C. Xu, S. Zhang, L. Yan, Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chin. Sci. Bull. 59(21), 2541–2546 (2014)
X. Zou, D. Qiu, Three-step semiquantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696–1702 (2014)
S. Hassanpour, M. Houshmand, Efficient controlled quantum secure direct communication based on GHZ-like states. Quantum Inform. Process. 14(2), 739–753 (2015)
F.G. Deng, G.L. Long, X.S. Liu, Two-step quantum direct communica-tion protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)
J. Hu, B. Yu, M. Jing, L. Xiao, S. Jia, G. Qin, G. Long, Experimental quantum secure direct communication with single photons. arXiv preprint arXiv:1503.00451 (2015)
S. Mi, T.J. Wang, G.S. Jin, C. Wang, High-capacity quantum secure direct communication with orbital angular momentum of photons. Photon. J. IEEE 7(5), 1–8 (2015)
W. Zhang, D.S. Ding, Y.B. Sheng, L. Zhou, B.S. Shi, G.C. Guo, Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118(22), 220501 (2017)
K. Shih-Hung, H. Tzonelih, Cryptanalysis and improvement of controlled secure direct communication. Chin. Phys. B 22(6), 060308 (2013)
L. Jun, L. Yi-Min, C. Hai-Jing, S. Shou-Hua, Z. Zhan-Jun, Revisiting quantum secure direct communication with W state. Chin. Phys. Lett. 23(10), 2652 (2006)
F. Gao, S.J. Qin, Q.Y. Wen, F.C. Zhu, Cryptanalysis of multiparty controlled quantum secure direct communication using GreenbergerHorneZeilinger state. Opt. Commun. 283(1), 192–195 (2010)
X.H. Li, F.G. Deng, H.Y. Zhou, Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)
L. Jun, L. Yi-Min, X. Yan, Z. Zhan-Jun, Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding. Commun. Theor. Phys. 49(4):887 (2008)
T.H. Lin, C.W. Yang, T. Hwang, Attacks and improvement on Quantum direct communication with authentication. Int. J. Theor. Phys. 53(2), 597–602 (2014)
Y.G. Yang, Y.W. Teng, H.P. Chai, Q.Y. Wen, Revisiting the security of secure direct communication based on ping-pong protocol [Quantum Inf. Process. 8, 347 (2009)]. Quantum Inform. Process. 10(3), 317–323 (2011)
T.H. Lin, T. Hwang, Man-in-the-middle attack on quantum secure communications with authentication. Quantum inform. Process. 13(4), 917–923 (2014)
S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu, Improving the quantum secure direct communication by entangled qutrits and entanglement swapping against intercept-and-resend attack. Opt. Commun. 283(7), 1566–1568 (2010)
M. Naseri, Comment on:secure direct communication based on ping-pong protocol [Quantum Inf. Process. 8, 347 (2009)]. Quantum Inform. Process. 9(6), 693–698 (2010)
Z.C. Zhu, A.Q. Hu, A.M. Fu, Cryptanalysis and improvement of the controlled quantum secure direct communication by using four particle cluster states. Int. J. Theor. Phys. 53(5), 1495–1501 (2014)
Z.H. Liu, H.W. Chen, D. Wang, W.Q. Li, Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inform. Process. 13(6), 1345–1351 (2014)
C.H. Chang, Y.P. Luo, C.W. Yang, T. Hwang, Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inform. Process. 14(9), 3515–3522 (2015)
Q.L. Yue, C.H. Yu, B. Liu, Q.L. Wang, Cryptanalysis and improvement on robust EPR-pairs-based quantum secure communication with authentication resisting collective noise. Int. J. Theor. Phys. 55(10), 4262–4271 (2016)
Z. Liu, H. Chen, W. Liu, Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Int. J. Theor. Phys. 55(10), 4564–4576 (2016)
Z.H. Liu, H.W. Chen, W.J. Liu, information leakage problem in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55(11), 4681–4686 (2016)
C. Zhang, H. Situ, Information leakage in efficient bidirectional quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 55(11), 4702–4708 (2016)
C.E. Shannon, Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)
C. Portmann, Key recycling in authentication. IEEE Trans. Inf. Theory 60(7), 4383–4396 (2014)
Y. Chang, C. Xu, S. Zhang, L. Yan, Quantum secure direct communication and authentication protocol with single photons. Chin. Sci. Bull. 58(36), 4571–4576 (2013)
J. Wang, Q. Zhang, C.J. Tang, Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256–258 (2006)
A.D. Zhu, Y. Xia, Q.B. Fan, S. Zhang, Secure direct communication based on secret transmitting order of particles. Phys. Rev. A 73(2), 022338 (2006)
B. Schneier, Applied cryptography: protocols, algorithms, and source code in C (Wiley, New York, 2007)
T.O. e Silva, S. Herzog, S. Pardi, Empirical verification of the even Goldbach conjecture and computation of prime gaps up to 4 × 1018. Math. Comput. 83(288), 2033–2060 (2014)
H. Lai, J. Xiao, M.A. Orgun, L. Xue, J. Pieprzyk, Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Quantum Inf. Process. 13(4), 895–907 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Amerimehr, A., Hadain Dehkordi, M. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement. Appl. Phys. B 124, 44 (2018). https://doi.org/10.1007/s00340-018-6907-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00340-018-6907-z