Comment on “A practical protocol for three-party authenticated quantum key distribution”
- 129 Downloads
Guan et al. (Quantum Inf Process 13(11):2355–2374, 2014) proposed a three-party authenticated quantum key distribution protocol which allows two participants to authenticate each other and eventually share a session key between them with the help of a trusted center (TC), who has pre-shared a master key with each participant, respectively. After a successful authentication and key distribution process, TC and the participants update their master keys, respectively. However, this study points out that Guan et al.’s scheme suffers from the intercept-and-measure attack and information leakage problem, and has the synchronization problem.
KeywordsQuantum key distribution Authentication Information leakage Intercept-and-measure attack Synchronization Quantum fingerprinting
We would like to thank the Ministry of Science and Technology of Republic of China for financial support of this research under Contract No. MOST 105-2221-E-006-162-MY2.
- 1.Bennett, Ch.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International in Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984Google Scholar