GSIS / CIST Hwa Yean Lee 2005. 2. 21. Authenticated QKD protocol using one-time ID. Contents. Introduction Authentication with one-time ID Quantum Key distribution Security proof Conclusion. 1. Introduction. QKD (Quantum Key Distribution) protocols Advantage
Hwa Yean Lee
2005. 2. 21
: Unconditional security
: Vulnerability to the Man-in-the middle attack
: secret user and one-way function
where is a count.
where is Alice’s authentication key
and is Bob’s.
Eve4. Security proof
with probability ¼
for each check bit
in the authentication
the hash function,
Eve can estimate only
some bits of hashed value.
the probability of detection is 3/8.
the probability of detection is 7/16.
More research on this problem are needed.