A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography

被引:4
作者
Shi, Wei-Min [1 ]
Zhang, Jan-Biao [1 ]
Zhou, Yi-Hua [1 ]
Yang, Yu-Guang [1 ]
Zhang, Xin-Lan [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
来源
OPTIK | 2016年 / 127卷 / 20期
基金
中国国家自然科学基金;
关键词
Quantum deniable authentication; Non-interactive; Quantum trapdoor one-way function; Asymmetric quantum cryptography;
D O I
10.1016/j.ijleo.2016.06.064
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to reduce the communication cost, a non-interactive quantum deniable authentication based on asymmetric quantum cryptography is proposed. In the new scheme, the sender and receiver without interaction first agree a sharing secret key by utilizing their public and private key and then the sender generates the authentication information according to the sharing secret key, similarly, the receiver can also generate the same authentication codes according to the sharing secret key. So the receiver cannot prove the source of the message to a third party but can identify the true source of a given message. Compared with our previous schemes based on interaction, this new scheme has the remarkable advantages of reducing the communication cost, lessening the difficulty and intensity of necessary operations, and without help of a trusted center. Finally, the security analysis results show that this new scheme also satisfies the same basic security requirements of deniable authentication protocol such as completeness, deniability, and can withstand forgery attack, impersonation attack and inter-resend attack. (C) 2016 Elsevier GmbH. All rights reserved.
引用
收藏
页码:8693 / 8697
页数:5
相关论文
共 15 条
  • [1] [Anonymous], INT C THEOR COMP SCI
  • [2] [Anonymous], 451 CRYPT EPRINT ARC
  • [3] [Anonymous], 2001, ARXIVQUANTPH0105032
  • [4] Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"
    Chong, Song-Kong
    Tsai, Chia-Wei
    Hwang, Tzonelih
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2011, 50 (06) : 1793 - 1802
  • [5] Deniable authentication protocols
    Deng, X
    Lee, CH
    Zhu, H
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02): : 101 - 104
  • [6] Deniable authentication protocol based on Deffie-Hellman algorithm
    Fan, L
    Xu, CX
    Li, JH
    [J]. ELECTRONICS LETTERS, 2002, 38 (14) : 705 - 706
  • [7] Haibo Tian, 2012, Information Security and Cryptology. 7th International Conference, Inscrypt 2011. Revised Selected Papers, P142, DOI 10.1007/978-3-642-34704-7_12
  • [8] Kar Jayaprakash, 2013, International Journal of Network Security, V15, P357
  • [9] Intercept-resend attacks on Chen et al.'s quantum private comparison protocol and the improvements
    Lin, Jason
    Tseng, Hsin-Yi
    Hwang, Tzonelih
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (09) : 2412 - 2414
  • [10] Ma CB, 2007, LECT NOTES COMPUT SC, V4564, P124