Provably secure and password-authenticated quantum key agreement protocol with dynamic basis

被引:0
|
作者
Liu, Tianhua [1 ]
Meng, Yanlin [1 ]
Zhu, Hongfeng [1 ]
机构
[1] Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang,P.C 110034, China
关键词
Chaotic systems - Authentication - Quantum cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents password-authenticated quantum key agreement protocols (PAQKAPs) to guard security for internet era, which can combine classical cryptography and quantum cryptography in a universal way for the most common environment nowadays: Password. And PAQKAPs will guide in new directions for biometric-based with quantum cryptography, smart card-based with quantum cryptography and so on. Compared with the former research AQKDPs (authenticated quantum key distribution protocols), PAQKAPs have four merits: (1) the basis is dynamic against the long shared key revealed, (2) key agreement replaces key distribution for eliminating the server get the session key of the two users, (3) the server need not store the shared key with all the users, and the server only need keep its long secret key secret for saving storage space and avoiding verification table leakage, (4) any user need not store the shared key with the server, and s/he only keep the password in her/his brain. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the comparison with the related works. © 2018, Ubiquitous International. All rights reserved.
引用
收藏
页码:651 / 660
相关论文
共 50 条
  • [31] A Password-authenticated Key Agreement Scheme for Ad hoc Networks
    Hu Ronglei
    Chi Yaping
    Xu Fenglin
    Wei Zhanzhen
    Li Ran
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2943 - 2947
  • [32] Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
    Abdalla, Michel
    Catalano, Dario
    Chevalier, Celine
    Pointcheval, David
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 254 - +
  • [33] Potential weaknesses of AuthA password-authenticated key agreement protocols
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 580 - 583
  • [34] Efficient and provably secure password-based group key agreement protocol
    Zheng, Ming-Hui
    Zhou, Hui-Hua
    Li, Jun
    Cui, Guo-Hua
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 948 - 953
  • [35] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [36] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [37] MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
    Liu, Xiaoxue
    Li, Yanping
    Qu, Juan
    Jiang, Qi
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 669 - 677
  • [38] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, SK Hafizul
    Journal of Information Security and Applications, 2020, 52
  • [39] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, S. K. Hafizul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [40] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324