作者
Mina Doosti, Niraj Kumar, Mahshid Delavar, Elham Kashefi
发表日期
2021/9/30
期刊
ACM Transactions on Quantum Computing
卷号
2
期号
3
页码范围
1-40
出版商
ACM
简介
Recently, major progress has been made towards the realisation of quantum internet to enable a broad range of classically intractable applications. These applications such as delegated quantum computation require running a secure identification protocol between a low-resource and a high-resource party to provide secure communication. In this work, we propose two identification protocols based on the emerging hardware-secure solutions, the quantum Physical Unclonable Functions (qPUFs). The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice versa. Unlike existing identification protocols based on Quantum Read-out PUFs that rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties. We provide a …
引用总数
20212022202320245561
学术搜索中的文章
M Doosti, N Kumar, M Delavar, E Kashefi - ACM Transactions on Quantum Computing, 2021