Analysis of Counterfactual Quantum Certificate Authorization
A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89, 052307 (20)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.
KeywordsCounterfactual Quantum certificate authorization Quantum key distribution
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61202317, 61572246, 61272015, 61402275), the Plan for Scientific Innovation Talents of Henan Province (Grant No. 164100510003), the Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 13HASTIT042), and the Key Scientific Research Project in Universities of Henan Province (Grant Nos. 16A520021, 16A120007).
- 1.Kohnfelder, L. M.: Towards a practical public-key cryptosystem. B.S. Thesis, MIT, Cambridge (1978)Google Scholar
- 7.Guo, P., Wang, J., Li, B., et al.: A variable threshold-value authentication architecture for wireless mesh networks. J. Int. Tech. 15, 929 (2014)Google Scholar
- 10.Shen, J., Tan, H., Wang, J., et al.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Int. Tech. 16, 171 (2015)Google Scholar
- 21.Bennett, C. H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp 175–179. IEEE Press, London (1984)Google Scholar