High-dimensional quantum threshold anonymous identity authentication scheme

被引:0
作者
Song, Xiuli [1 ]
Liu, Yanbing [1 ]
Deng, Hongyao [2 ]
Xiao, Yonggang [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Network Informat Secur Technol, Chongqing 400065, Peoples R China
[2] Yangtze Normal Univ, Coll Comp Engn, Chongqing 408100, Peoples R China
基金
中国国家自然科学基金;
关键词
(t; n); threshold; Quantum anonymous identity authentication; d-Dimensional entanglement swapping; Privacy protection;
D O I
10.1007/s11128-018-1969-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the existing quantum identity authentication (QIA) schemes, single-party QIA needs to run authentication process multiple times for multi-user system. (n, n) multi-party QIA does not consider some special occasions such as user's illness, travel. Anonymous QIA only considers how to protect users' privacy but overlooks the efficiency of authentication process. In this paper, a high-dimensional quantum threshold anonymous identity authentication (HDQTAIA) scheme is proposed to overcome these limits. In HDQTAIA, each user adds private token to his/her own particle by performing d-dimensional generalized Pauli operator. When a manager performs a projective measurement on his/her two particles, with d-dimensional entanglement swapping, the tokens of any t out of n users are aggregated into the particle of the Server. The Server judges whether the authentication is successful or not by checking hash value of the aggregated token. Property analysis shows that HDQTAIA has authentications simultaneity, token unforgeability and identity anonymity. Security analysis shows that HDQTAIA can resist intercept-resend, entangle-measure, forgery, collusion and Trojan horse attacks. Performance comparison shows that HDQTAIA has better universality and flexibility, and offers lower resource consumption, computation and communication overheads than other similar QIA schemes.
引用
收藏
页数:17
相关论文
共 25 条
[1]   Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks [J].
Cao, Xuefei ;
Zeng, Xingwen ;
Kou, Weidong ;
Hu, Liangbing .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) :3508-3517
[2]  
Chia-Hung Chien, 2011, 2011 IEEE 11th International Conference on Nanotechnology (IEEE-NANO), P1533, DOI 10.1109/NANO.2011.6144395
[3]  
Curty M, 2001, PHYS REV A, V64, P168
[4]   Improving the security of multiparty quantum secret sharing against Trojan horse attack [J].
Deng, FG ;
Li, XH ;
Zhou, HY ;
Zhang, ZJ .
PHYSICAL REVIEW A, 2005, 72 (04)
[5]   Quantum Counting: Algorithm and Error Distribution [J].
Diao, Zijian ;
Huang, Chunfeng ;
Wang, Ke .
ACTA APPLICANDAE MATHEMATICAE, 2012, 118 (01) :147-159
[6]   Anonymous Authentication Scheme based on Proxy Group Signature for Wireless MESH Network [J].
Gao, Tianhan ;
Miao, Qidi ;
Guo, Nan .
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, :533-537
[7]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)
[8]   Quantum identity authentication with single photon [J].
Hong, Chang ho ;
Heo, Jino ;
Jang, Jin Gak ;
Kwon, Daesung .
QUANTUM INFORMATION PROCESSING, 2017, 16 (10)
[9]  
Karimipour V., 2002, PHYS REV A, V65, P579
[10]  
Lee H, 2005, PHYS REV A, V73