liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.
Linköping University, Department of Mathematics, Applied Mathematics. Linköping University, The Institute of Technology.ORCID iD: 0000-0002-1082-8325
2009 (English)In: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008, New York: American Institute of Physics , 2009, Vol. 1101, 289-293 p.Conference paper, Published paper (Refereed)
Abstract [en]

Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?

Place, publisher, year, edition, pages
New York: American Institute of Physics , 2009. Vol. 1101, 289-293 p.
Keyword [en]
Quantum cryptography, Quantum theory, Probability
National Category
Mathematics
Identifiers
URN: urn:nbn:se:liu:diva-18738DOI: 10.1063/1.3109951OAI: oai:DiVA.org:liu-18738DiVA: diva2:221270
Conference
Foundations of Probability and Physics—5, Växjö, augusti 2008
Projects
ICG QC
Available from: 2009-06-03 Created: 2009-06-03 Last updated: 2016-08-31
In thesis
1. Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions
Open this publication in new window or tab >>Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions
2010 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. Therefore, to guarantee unconditional security of any Quantum Cryptographic protocols, the authentication used must also be unconditionally secure. The standard in Quantum Cryptography is to use theWegman-Carter authentication, which is unconditionally secure and is based on the idea of universal hashing.

In this thesis, we first investigate properties of a Strongly Universal hash function family to facilitate understanding the properties of (classical) authentication used in Quantum Cryptography. Then, we study vulnerabilities of a recently proposed authentication protocol intended to rule out a "man-in-the-middle" attack on Quantum Cryptography. Here, we point out that the proposed authentication primitive is not secure when used in a generic Quantum Cryptographic protocol. Lastly, we estimate the lifetime of authentication using encrypted tags when the encryption key is partially known. Under simplifying assumptions, we derive that the lifetime is linearly dependent on the length of the authentication key. Experimental results that support the theoretical results are also presented.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2010. 37 p.
Series
Linköping Studies in Science and Technology. Thesis, ISSN 0280-7971 ; 1447
National Category
Mathematics
Identifiers
urn:nbn:se:liu:diva-57290 (URN)978-91-7393-354-4 (ISBN)
Supervisors
Projects
ICG QC
Available from: 2010-06-16 Created: 2010-06-16 Last updated: 2016-08-31Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Authority records BETA

Abidin, AysajanLarsson, Jan-Åke

Search in DiVA

By author/editor
Abidin, AysajanLarsson, Jan-Åke
By organisation
Applied MathematicsThe Institute of Technology
Mathematics

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 1828 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf