量子克隆
克隆(编程)
量子计算机
计算机科学
量子密钥分配
量子
认证(法律)
背景(考古学)
理论计算机科学
计算机安全
物理
量子网络
量子力学
生物
古生物学
程序设计语言
作者
Yao Yao,Ming Gao,Mo Li,Jian Zhang
标识
DOI:10.1007/s11128-016-1316-x
摘要
With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.
科研通智能强力驱动
Strongly Powered by AbleSci AI