pith. machine review for the scientific record. sign in

arxiv: 0810.5050 · v2 · submitted 2008-10-28 · 🪐 quant-ph

Recognition: unknown

Vulnerability of "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in Quantum Cryptography"

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords algorithmattackcryptographyman-in-the-middlenovelprotocolprotocol-authenticationquantum
0
0 comments X
read the original abstract

In this paper we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography", [M. Peev et al., Int. J. Quant. Inform., 3, 225, (2005)]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.