Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints
Abstract
We define the task of quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is unbounded. We define simple security models for this task and briefly discuss alternatives. We illustrate the pitfalls of naive quantum cryptographic reasoning in this context by describing several protocols which at first sight appear unconditionally secure but which, as we show, can in fact be broken by teleportation-based attacks. We also describe some protocols which cannot be broken by these specific attacks, but do not prove they are unconditionally secure. We review the history of quantum tagging protocols, and show that protocols previously proposed by Malaney and Chandran are provably insecure.
- Publication:
-
Physical Review A
- Pub Date:
- July 2011
- DOI:
- 10.1103/PhysRevA.84.012326
- arXiv:
- arXiv:1008.2147
- Bibcode:
- 2011PhRvA..84a2326K
- Keywords:
-
- 03.67.Dd;
- Quantum cryptography;
- Quantum Physics;
- Computer Science - Cryptography and Security;
- Computer Science - Information Theory
- E-Print:
- Minor update re subsequent refs