2004
DOI: 10.1016/j.physleta.2004.04.083
|View full text |Cite
|
Sign up to set email alerts
|

How much security does Y-00 protocol provide us?

Abstract: New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the different grounds from that of the conventional ones. We have, then, tried to cryptoanalyze Y-00 protocol in the view of cryptographic communication system. As a result, it turns out that the security of Y-00 protocol is equivalent to that of classical stream c… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 9 publications
(14 reference statements)
0
17
0
Order By: Relevance
“…Generally, only search-complexity based security will be quantitatively described in this paper. Finally, we rebut the claims in [5,6] that αη security is equivalent to that of a standard stream cipher and that αη is nonrandom.…”
Section: Introductionmentioning
confidence: 82%
See 2 more Smart Citations
“…Generally, only search-complexity based security will be quantitatively described in this paper. Finally, we rebut the claims in [5,6] that αη security is equivalent to that of a standard stream cipher and that αη is nonrandom.…”
Section: Introductionmentioning
confidence: 82%
“…In Section 4, we describe the αη system in detail, show its quantum random cipher characteristics, and highlight its advantages. In Section 5, we respond to the criticisms on αη made by Nishioka et al [5,6] in a further elaboration of the quantitative random cipher character of αη.…”
Section: Introductionmentioning
confidence: 95%
See 1 more Smart Citation
“…In fact, there have been some criticisms against Y-00 based on such an indirect measurement [21], but they are wrong. Here we analyze the subjects related to those criticisms.…”
Section: B Indirect Measurementmentioning
confidence: 99%
“…The detailed analysis and estimation are shown in [2], [7], [6], [10] and so on. In many cases, the attack by Algorithm A is either a correlation attack or a fast correlation attack, and the target PRNG is an M sequence generator.…”
Section: Analytical Evaluationmentioning
confidence: 99%