Information-theoretically secure data origin authentication with quantum and classical resources

  title={Information-theoretically secure data origin authentication with quantum and classical resources},
  author={Georgios M. Nikolopoulos and Marc Fischlin},
In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is twice as long as the message. We address the question as of whether quantum resources can offer any advantage over classical unconditionally secure message authentication codes. It is shown that passive prepare-and-measure quantum message-authentication schemes cannot do better… 
1 Citations
Remote quantum-safe authentication of entities with physical unclonable functions
This work proposes a protocol, which can operate over large distances, and offers security against both classical and quantum adversaries, and is fully compatible with the infrastructure of existing and future photonic networks, and it can operate in parallel with other quantum protocols, including QKD protocols.


Quantum authentication of classical messages
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and
Public-key cryptography based on bounded quantum reference frames
It is proved that secure reusable quantum-public-key authentication is possible to some extent and the framework introduced can be seen as a public-key analogue of the framework of Bartlett et al. 1, where a private shared reference frame is shown to have cryptographic application.
Quantum digital signatures with quantum-key-distribution components
Digital signatures guarantee the authenticity and transferability of messages and are widely used in modern communication. The security of currently used classical digital signature schemes, however,
Deterministic quantum-public-key encryption: Forward search attack and randomization
In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret
Quantum Digital Signatures
We present a quantum digital signature scheme whose security is based on fundamental principles of quantum physics. It allows a sender (Alice) to sign a message in such a way that the signature can
Efficient Unconditionally Secure Signatures Using Universal Hashing
This work extends symmetric-key message authentication codes (MACs) based on universal hashing to make them transferable, a property absent from traditional MAC schemes.
Unconditionally Secure Quantum Signatures
This paper aims to provide an accessible and comprehensive review of existing unconditionally secure secure signature schemes for signing classical messages, with a focus on unconditional or information-theoretic security quantum signature schemes.
Security of quantum digital signatures for classical messages
It is shown that it is necessary to define the entire protocol to deal with the problem of sending multi-bit messages based on the basic building blocks and analyse its security.
Practical quantum digital signature
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics,
Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions
Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quantum transmission and measurement on a quantum channel, and classical post-processing on a public c