Provably secure three-party authenticated quantum key distribution protocols

被引:59
作者
Hwang, Tzonelih [1 ]
Lee, Kuo-Chang [1 ]
Li, Chuan-Ming [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
quantum cryptography; three-party key distribution protocol; provable security;
D O I
10.1109/TDSC.2007.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-in-the-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret ( repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.
引用
收藏
页码:71 / 80
页数:10
相关论文
共 26 条
[1]  
ASOKAN N, 2003, P INT WORKSH SEC PRO
[2]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[3]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[4]  
Bennett C. H., 1984, P IEEE INT C COMP SY, DOI DOI 10.1016/J.TCS.2014.05.025
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]  
Bresson E., 2001, PROC 8 ACM C COMPUT, P255
[7]   Can quantum-mechanical description of physical reality be considered complete? [J].
Einstein, A ;
Podolsky, B ;
Rosen, N .
PHYSICAL REVIEW, 1935, 47 (10) :0777-0780
[8]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[9]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[10]   Efficient network authentication protocols: Lower bounds and optimal implementations [J].
Gong, L .
DISTRIBUTED COMPUTING, 1995, 9 (03) :131-145