Pioneering quantum authenticated key agreement through Grover’s algorithm

Existing quantum key agreement (QKA) protocols based on Grover’s search algorithm suffer from a critical security vulnerability: the absence of mutual authentication mechanisms between participants. This fundamental flaw enables man-in-the-middle attacks, malicious state injection, and protocol disr...

Full description

Saved in:
Bibliographic Details
Published inQuantum information processing Vol. 24; no. 10; p. 323
Main Authors Chen, Tzung-Her, Lee, Chien-Ding, Chang, Yu-Chieh
Format Journal Article
LanguageEnglish
Published New York Springer US 30.09.2025
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1573-1332
1570-0755
1573-1332
DOI10.1007/s11128-025-04942-z

Cover

More Information
Summary:Existing quantum key agreement (QKA) protocols based on Grover’s search algorithm suffer from a critical security vulnerability: the absence of mutual authentication mechanisms between participants. This fundamental flaw enables man-in-the-middle attacks, malicious state injection, and protocol disruption by unauthorized parties. We present the first quantum authenticated key agreement (QAKA) protocol that integrates Grover’s algorithm with comprehensive mutual authentication, addressing the authentication gap in current Grover-based QKA schemes. Our protocol employs a strategically decoy photon insertion mechanism specifically designed for quantum identity verification, combined with a trusted third-party framework that enables both initial authentication and direct mutual verification between communicating parties. Security analysis demonstrates the security against both external eavesdropping and internal authentication attacks.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1573-1332
1570-0755
1573-1332
DOI:10.1007/s11128-025-04942-z