{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:02:11Z","timestamp":1769846531580,"version":"3.49.0"},"reference-count":35,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T00:00:00Z","timestamp":1571961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["CRC 1119 CROSSING"],"award-info":[{"award-number":["CRC 1119 CROSSING"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Optical physical unclonable keys are currently considered to be rather promising candidates for the development of entity authentication protocols, which offer security against both classical and quantum adversaries. In this work, we investigate the robustness of a continuous-variable protocol, which relies on the scattering of coherent states of light from the key, against three different types of intercept\u2013resend emulation attacks. The performance of the protocol is analyzed for a broad range of physical parameters, and our results are compared to existing security bounds.<\/jats:p>","DOI":"10.3390\/cryptography3040025","type":"journal-article","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T11:05:18Z","timestamp":1572001518000},"page":"25","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys"],"prefix":"10.3390","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9056-6224","authenticated-orcid":false,"given":"Lukas","family":"Fladung","sequence":"first","affiliation":[{"name":"Institut f\u00fcr Angewandte Physik, Technische Universit\u00e4t Darmstadt, D-64289 Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3937-2771","authenticated-orcid":false,"given":"Georgios M.","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"Institut f\u00fcr Angewandte Physik, Technische Universit\u00e4t Darmstadt, D-64289 Darmstadt, Germany"},{"name":"Institute of Electronic Structure and Laser, FORTH, P.O. Box 1385, GR-70013 Heraklion, Greece"}]},{"given":"Gernot","family":"Alber","sequence":"additional","affiliation":[{"name":"Institut f\u00fcr Angewandte Physik, Technische Universit\u00e4t Darmstadt, D-64289 Darmstadt, Germany"}]},{"given":"Marc","family":"Fischlin","sequence":"additional","affiliation":[{"name":"Cryptoplexity, Technische Universit\u00e4t Darmstadt, D-64289 Darmstadt, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2019,10,25]]},"reference":[{"key":"ref_1","unstructured":"Menezes, A., van Oorschot, P., and Vanstone, S. (1996). Handbook of Applied Cryptography, CRC Press."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Martin, K.M. (2012). Everyday Cryptography: Fundamental Principles and Applications, Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199695591.001.0001"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical Unclonable Functions and Applications: A Tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., and Holcomb, D.E. (2014, January 24\u201328). PUFs at a Glance. Proceedings of the Conference on Design, Automation and Test in Europe (DATE\u201914), Dresden, Germany.","DOI":"10.7873\/DATE.2014.360"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","article-title":"Extracting secret keys from integrated circuits","volume":"13","author":"Daihyun","year":"2005","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical one-way functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Maes, R. (2013). Physically Unclonable Functions: Constructions, Properties and Applications, Springer.","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"011303","DOI":"10.1063\/1.5079407","article-title":"A PUF taxonomy","volume":"6","author":"McGrath","year":"2019","journal-title":"Appl. Phys. Rev."},{"key":"ref_9","unstructured":"Santikellur, P., Bhattacharyay, A., and Chakraborty, R.S. (2019, October 24). Deep Learning Based Model Building Attacks on Arbiter PUF Compositions. Cryptology ePrint Archive, Report 2019\/566. Available online: https:\/\/eprint.iacr.org\/2019\/566."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Khalafalla, M., and Gebotys, C. (2019, January 25\u201329). PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy.","DOI":"10.23919\/DATE.2019.8714862"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"122513","DOI":"10.1109\/ACCESS.2019.2938408","article-title":"PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks","volume":"7","author":"Ganji","year":"2019","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","article-title":"Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF\u2013FSMs","volume":"14","author":"Delvaux","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","unstructured":"R\u00fchrmair, U., Hilgers, C., Urban, S., Weiersh\u00e4user, A., Dinter, E., Forster, B., and Jirauschek, C. (2019, October 24). Optical PUFs Reloaded. Cryptology ePrint Archive, Report 2013\/215. Available online: https:\/\/eprint.iacr.org\/2013\/215."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1364\/OPTICA.1.000421","article-title":"Quantum-secure authentication of a physical unclonable key","volume":"1","author":"Goorden","year":"2014","journal-title":"Optica"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"46047","DOI":"10.1038\/srep46047","article-title":"Continuous-variable quantum authentication of physical unclonable keys","volume":"7","author":"Nikolopoulos","year":"2017","journal-title":"Sci. Rep."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"012324","DOI":"10.1103\/PhysRevA.97.012324","article-title":"Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack","volume":"97","author":"Nikolopoulos","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"12189","DOI":"10.1364\/OE.23.012189","article-title":"Feedback-based wavefront shaping","volume":"23","author":"Vellekoop","year":"2015","journal-title":"Opt. Express"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1038\/nphoton.2012.88","article-title":"Controlling waves in space and time for imaging and focusing in complex media","volume":"6","author":"Mosk","year":"2012","journal-title":"Nat. Photonics"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"123021","DOI":"10.1088\/1367-2630\/13\/12\/123021","article-title":"Controlling light through optical disordered media: transmission matrix approach","volume":"13","author":"Poppoff","year":"2011","journal-title":"New J. Phys."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"6090","DOI":"10.1364\/OL.39.006090","article-title":"Nonclassical light manipulation in a multiple-scattering medium","volume":"39","author":"Defienne","year":"2014","journal-title":"Opt. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1007\/s00340-013-5742-5","article-title":"Controlling single-photon Fock-state propagation through opaque scattering media","volume":"116","author":"Huisman","year":"2014","journal-title":"Appl. Phys. B"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3102","DOI":"10.1364\/OE.23.003102","article-title":"Programmable multiport optical circuits in opaque scattering materials","volume":"23","author":"Huisman","year":"2015","journal-title":"Opt. Express"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/0030-4018(95)00321-X","article-title":"Uncertainty relations for realistic joint measurements of position and momentum in quantum optics","volume":"119","author":"Leonhardt","year":"1995","journal-title":"Opt. Commun."},{"key":"ref_24","unstructured":"Schleich, W.P. (2011). Quantum Optics in Phase Space, John Wiley & Sons."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/S0375-9601(98)00827-5","article-title":"Optimum unambiguous discrimination between linearly independent symmetric states","volume":"250","author":"Chefles","year":"1998","journal-title":"Phys. Lett. A"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/0375-9601(87)90222-2","article-title":"How to differentiate between non-orthogonal states","volume":"123","author":"Ivanovic","year":"1987","journal-title":"Phys. Lett. A"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/0375-9601(88)91034-1","article-title":"How to differentiate between non-orthogonal states","volume":"128","author":"Peres","year":"1988","journal-title":"Phys. Lett. A"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/0375-9601(88)90840-7","article-title":"Overlap and distinguishability of quantum states","volume":"126","author":"Dieks","year":"1988","journal-title":"Phys. Lett. A"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1364\/AOP.1.000238","article-title":"Quantum state discrimination","volume":"1","author":"Barnett","year":"2009","journal-title":"Adv. Opt. Photonics"},{"key":"ref_30","unstructured":"Weir, G. (2018). Optimal Discrimination of Quantum States. [Ph.D. Thesis, University of Glasgow]."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"033842","DOI":"10.1103\/PhysRevA.94.033842","article-title":"Optical phase estimation via the coherent state and displaced-photon counting","volume":"94","author":"Izumi","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"100503","DOI":"10.1103\/PhysRevLett.117.100503","article-title":"Free-Space Quantum Signatures Using Heterodyne Measurements","volume":"117","author":"Croal","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"042313","DOI":"10.1103\/PhysRevA.66.042313","article-title":"Unambiguous state discrimination of coherent states with linear optics: Application to quantum cryptography","volume":"66","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3543","DOI":"10.1038\/srep03543","article-title":"Physical key-protected one-time pad","volume":"3","author":"Horstmayer","year":"2013","journal-title":"Sci. Rep."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"29367","DOI":"10.1364\/OE.27.029367","article-title":"Optical scheme for cryptographic commitments with physical unclonable keys","volume":"27","author":"Nikolopoulos","year":"2019","journal-title":"Opt. Express"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/4\/25\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:29:28Z","timestamp":1760189368000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/3\/4\/25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,25]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["cryptography3040025"],"URL":"https:\/\/doi.org\/10.3390\/cryptography3040025","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,25]]}}}