Provably secure three-party authenticated quantum key distribution protocols

被引:59
|
作者
Hwang, Tzonelih [1 ]
Lee, Kuo-Chang [1 ]
Li, Chuan-Ming [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
quantum cryptography; three-party key distribution protocol; provable security;
D O I
10.1109/TDSC.2007.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-in-the-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret ( repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.
引用
收藏
页码:71 / 80
页数:10
相关论文
共 50 条
  • [1] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [2] Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    Wang, Weijia
    Hu, Lei
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 118 - +
  • [3] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [4] Provably secure three-party password authenticated key exchange protocol in the standard model
    Yang, Jun-Han
    Cao, Tian-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 340 - 350
  • [5] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [6] A practical protocol for three-party authenticated quantum key distribution
    D. J. Guan
    Yuan-Jiun Wang
    E. S. Zhuang
    Quantum Information Processing, 2014, 13 : 2355 - 2374
  • [7] A practical protocol for three-party authenticated quantum key distribution
    Guan, D. J.
    Wang, Yuan-Jiun
    Zhuang, E. S.
    QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2355 - 2374
  • [8] PROVABLY SECURE HIGH ENTROPY THREE-PARTY AUTHENTICATED KEY EXCHANGE SCHEME FOR NETWORK ENVIRONMENTS
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Huang, Ya-Chieh
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (10): : 5619 - 5630
  • [9] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [10] Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
    Kanamori, Yoshito
    Hoanca, Bogdan
    Yoo, Seong-Moo
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,