Provably secure and password-authenticated quantum key agreement protocol with dynamic basis

被引:0
|
作者
Liu, Tianhua [1 ]
Meng, Yanlin [1 ]
Zhu, Hongfeng [1 ]
机构
[1] Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang,P.C 110034, China
关键词
Chaotic systems - Authentication - Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents password-authenticated quantum key agreement protocols (PAQKAPs) to guard security for internet era, which can combine classical cryptography and quantum cryptography in a universal way for the most common environment nowadays: Password. And PAQKAPs will guide in new directions for biometric-based with quantum cryptography, smart card-based with quantum cryptography and so on. Compared with the former research AQKDPs (authenticated quantum key distribution protocols), PAQKAPs have four merits: (1) the basis is dynamic against the long shared key revealed, (2) key agreement replaces key distribution for eliminating the server get the session key of the two users, (3) the server need not store the shared key with all the users, and the server only need keep its long secret key secret for saving storage space and avoiding verification table leakage, (4) any user need not store the shared key with the server, and s/he only keep the password in her/his brain. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the comparison with the related works. © 2018, Ubiquitous International. All rights reserved.
引用
收藏
页码:651 / 660
相关论文
共 50 条
  • [21] Parallelizable password-authenticated key exchange protocol
    Lee, SW
    Yoo, KY
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 1014 - 1019
  • [22] Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption
    Wang, Fengjiao
    Zhang, Yuqing
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 124 - 133
  • [23] An optimal round two-party password-authenticated key agreement protocol
    Strangio, Maurizio A.
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 216 - 223
  • [24] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [25] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [26] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [27] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] Provably-secure two-round password-authenticated group key exchange in the standard model
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 322 - 336
  • [30] Analysis of the SPEKE password-authenticated key exchange protocol
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (01) : 63 - 65