DOI QR코드

DOI QR Code

CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜

Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality

  • 허진오 (고려대학교 정보경영공학전문대학원) ;
  • 홍창호 (고려대학교 정보경영공학전문대학원) ;
  • 임종인 (고려대학교 정보경영공학전문대학원) ;
  • 양형진 (고려대학교 정보경영공학전문대학원, 고려대학교 디스플레이 반도체 물리학과)
  • Heo, Jin-O (Graduate School of Information Management and Security, Korea University) ;
  • Hong, Chang-Ho (Graduate School of Information Management and Security, Korea University) ;
  • Lim, Jong-In (Graduate School of Information Management and Security, Korea University) ;
  • Yang, Hyoung-Jin (Graduate School of Information Management and Security, Korea University, Department of Display Semiconductor, Korea University)
  • 발행 : 2008.08.30

초록

본 논문에서는 Bao-sen Shi(2001년)에 의해 제안된 얽힘 상태(벨 상태)를 이용한 양자 키 분배와 양자 인증 프로토콜의 취약성을 분석하고 그것을 보완한 프로토콜을 제안한다. 기존의 프로토콜은 사용자들이 제 3자(중재자)를 인증하는 과정만 존재했기 때문에 도청자의 Impersonation 공격에 대해 취약성을 가지고 있었다. 본 논문이 제안하는 프로토콜은 CHSH 부등식을 이용한 체크 모드를 사용하여 중재자가 사용자들을 인증함으로써 안전성을 보완한 프로토콜이다.

We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

키워드

참고문헌

  1. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), pp. 175
  2. 홍창호, 이화연, 김지인, 임종인, 양형진, 'Entanglement Swapping을 이용한 안전한 직접 통신 프로토콜', 한국정보보호학회논문지, 16(1), Feb 2005
  3. H. Y. Lee, J. I. Lim, H. J. Yang, 'Quantm direct communication with authentication.' Phys. Rev. A 73, 042305, 2006
  4. C. H. Bennett and G. Brassard, C. Crepeau, R. Jozsa, A. Pres, and W, Wooters, 'Teleporting an Unknown quantum state via dual classical and EPR channels.', Phys. Rev. Lett, 70:1859-1899, 1993
  5. M. D. Barrett, J. Chiaverini, T. Schaetz, J. Britton, 'Deterministic Quantum teleportation of atomic qubits.', Nature, 429, 737, 2004
  6. M. Hillery, V. Buzek, and A. Berthiaume, 'Quantum secret sharing.', Phys. Rev. A, 59, 1829, 1999
  7. C. Schmid, P. Trojek, M. Brourennance, C. Kurtsiefer, 'Experimental single Quantum secret sharing.', Phys. Rev. Lett, 95, 230505, 2005
  8. A. Ekert, 'Quantum cryptography based on Bell's Theorem.', Phys. Rev. Lett, 67,661, 1999
  9. W. K. Wooters, W. H. Zurek , 'A Single Quantum cannot be cloned.', Nature, 299:802-803, 1982 https://doi.org/10.1038/299802a0
  10. R. J. Hughes, J. E. Nordholt, D. Derekcs, C. G. Peterson, 'Practical free-space Quantum key distribution over 10Km in dayright and at night.', New. Journal. of Phys, 4, 43 2002
  11. C. Krutsiefer, P. Zarda, M. Halder, H. Weinfurter, P. M. Goran, P. R. Tapster, J. G. Rarity, 'A step towards global key distribution.', Nature, 491:450, 2002
  12. 이화연, 홍창호, 이덕진, 양형진, 임종인, '인증된 양자 키 분배 프로토콜.', 한국정보보호학회논문지 14(2), April 2004
  13. J. Oppenheim, M. Horodecki, 'How to reuse a one time pad other nites on authentication encryption and protection of Quantum information.', Phys. Rev. A, 72. 042309, 2005
  14. E. Dennis, A. Kitaev, A. Landahl, J. Preskill, 'Topolgical Quantum memories.', J. Math. Phys, 43. 4452, 2002
  15. V. Giovannetti, D. Burgarth, 'Improved transfer of Quantum information using a local memory.', Phys. Rev. Lett, 96. 030501, 2006
  16. Bao-sen Shi, Jian Li, Jin-Ming Liu, Xiao-Feng Fan, Guang-Can Guo, 'Quantum key distribution and Quantum authentication based on entangled state.', Phys. Lett, A, 281:83-87, 2001 https://doi.org/10.1016/S0375-9601(01)00129-3
  17. A. Nielsen, L. Chuang, 'Quantum computation and Quantum information.', CAMBRIDGE UNIVERSITY PRESS
  18. M. Zukowski, A. Zeilinger, M. A. Home, A. K. Ekert, 'Event-ready-detectors Bell experiment via Entaglement Swapping.', Phys. Rev. Lett, 71:4287-4290, 1993 https://doi.org/10.1103/PhysRevLett.71.4287
  19. H. De riedmatten. I. Marcikic, A. W. van Houwelingen, W. Tittel, H. Zbinden, N. Gisin, 'Long distance entanglement swapping with photons from separated sources.', Phys. Rev. A, 71,050302, 2005
  20. J. F. Clauser, M. A. Home, A. Shimony, R. A. Holt, 'Proposed experiment to test Local Hidden-Variable theories.', Phys. Rev. Lett, 23:880-884, 1969 https://doi.org/10.1103/PhysRevLett.23.880
  21. J. F. Clauser, M. A. Home, 'Experimental consequences of objective local theories.', Phys. Rev. D, 10, 526, 1974
  22. J. S. Bell, 'Speakable and Unspeakable in Quantum Mechanics. ', CAMBRIDGE UNIVERSITY PRESS
  23. A. Einstein, B. Podolsky, N. Rosen, 'Can Quantum Mechanical description of Physical Reality be considered complete?', Phys. Rev. Lett, 47:777-780, 1935
  24. A. Aspect, P. Grangier, G. Roger, 'Experimental tests of Realistic Local Theories via Bell's Theorem.', Phys. Rev. Lett, 47:460-463, 1981 https://doi.org/10.1103/PhysRevLett.47.460
  25. A. Aspect, J. Dalibard, G. Roger, 'Experimental tests of Bell's inequalites using time varying analyzers.', Phys. Rev. Lett, 49, 1804, 1982