Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry under Quantum Collective Known-Plaintext Attacks

8Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we concretely formulate to derive the attacker's success probability of obtaining the shared secret keys for the Y00 protocol under a combination of a quantum collective attack with infinitely-long known-plaintext, naming it "collective known-plaintext attack"in this work. In contrast, our previous work showed only the necessary condition to design Y00 transmitters to be information-theoretic secure. The keystone of the security evaluations in this work is the time-translational symmetry of the Y00 signals modulated by pseudo-random number generators, such as linear-feedback shift registers or Mersenne twisters. With the assist of a true-random deliberate-signal-randomization, information-theoretic security would be realized. By numerical simulations, we can determine whether the designed Y00 transmitters are information-theoretic secure. However, this work's security evaluation may not apply to the transmitters with cryptographically-secure pseudo-random number generators because they might not have time-translational symmetry, even though such Y00 transmitters may be securer. We also describe future challenges for theorists to accelerate designing securer Y00 transmitters.

Cite

CITATION STYLE

APA

Iwakoshi, T. (2021). Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry under Quantum Collective Known-Plaintext Attacks. IEEE Access, 9, 31608–31617. https://doi.org/10.1109/ACCESS.2021.3056494

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free