Security of Quantum Cryptography Against Trojan Horse Attacking
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [8]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Trojan horse attacking strategy on quantum cryptography is investigated. First, the fragility of the quantum cryptographic algorithm employing EPR (Einstein-Podosky-Rosen) pairs as a key against the Trojan horse attacking strategy is analyzed. To prevent the Trojan horse attacking, an improved scheme which makes use of the non-orthogonal entangled states is proposed. This scheme is robust to the Trojan horse attacking, without reducing the security on other kinds of attacking strategies.

    Reference
    [1]Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., 1994.
    [2]Bennett CH, Brassard G. An update on quantum cryptography. In: Advances in Cryptology: Proc. of Crypto'84. Springer-Verlag, 1984. 475~478.
    [3]Lo H-K, Chau HF. Unconditional security of quantum key distribution over arbitrary long distances. Science, 1999,283:2050~2056.
    [4]Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Review Modern Physics, 2002,74:145~195.
    [5]Zeng G, Zhang W. Identity verification in quantum cryptography. Physical Review A, 2000,61:032303/1-5.
    [6]Larsson J. A practical Trojan horse for bell-inequality-based quantum cryptography. arXiv: quant-ph/0111073, 13 Nov 2001.
    [7]Zhang Y, Li C, Guo G. Quantum key distribution via quantum encryption. Physical Review A, 2001,64:024302/1-4.
    [8]Leung DW. Quantum vernam cipher. arXiv: quant-ph/0012077, newest version, 2001.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

曾贵华.特洛依木马攻击下的量子密码安全性.软件学报,2004,15(8):1259-1264

Copy
Share
Article Metrics
  • Abstract:4127
  • PDF: 5218
  • HTML: 0
  • Cited by: 0
History
  • Received:November 19,2002
  • Revised:July 02,2003
You are the first2038531Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063