2020
DOI: 10.1109/access.2020.2969455
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security

Abstract: In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the attacker's quantum memory.However, there were several assumptions that the Y00 system utilized linear-feedback shift registers as pseudo-random-number generators, and a fast correlation attack was disabled by irregular mapping on the Y00 systems. This study gene… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 28 publications
(53 reference statements)
0
10
0
Order By: Relevance
“…For a long time, the precise color matching of prosthesis has been concerned. However, the disadvantage of silicone rubber and pigments is that they will fade over time [ 3 ]. Some data show that in clinical use, the time for patients to request the replacement of prostheses because of color change is months to a year, and color mismatch has become the main reason for the end of the service life of prostheses.…”
Section: Introductionmentioning
confidence: 99%
“…For a long time, the precise color matching of prosthesis has been concerned. However, the disadvantage of silicone rubber and pigments is that they will fade over time [ 3 ]. Some data show that in clinical use, the time for patients to request the replacement of prostheses because of color change is months to a year, and color mismatch has become the main reason for the end of the service life of prostheses.…”
Section: Introductionmentioning
confidence: 99%
“…Suppose that a set of measurement operators at timeslot t { M ( m, m '; t | x )} is provided that satisfies the optimality corresponding to { ρ ( m , m ', x ; t )} [36–38, 49, 50]. Then the tensor product { M ( m, m '| x )} is a set of optimal measurements corresponding to { ρ ( m , m ', x )}.…”
Section: Overview Of Security Analysismentioning
confidence: 99%
“…When the attacks perform measurements such as CKP or GFC attacks, the effective valiance of the noise reduces as follows, from Equations (6)–(9). The concept was already given in Refs [36–38]. σ(N)2σ2/Ntrue→0 $\sigma {(N)}^{2}\propto {\sigma }^{2}/N\to 0$ …”
Section: Overview Of Security Analysismentioning
confidence: 99%
See 2 more Smart Citations