A Smart Card-Based Three-Party Quantum Key Distribution Protocol

被引:0
作者
Wijayantol, Heri [1 ,2 ]
Chen, Hsing-Chung [1 ,3 ]
Lin, Wen Yen [4 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[2] Mataram Univ, Dept Informat Engn, 62 Majapahit Rd, Mataram, Indonesia
[3] China Med Univ, China Med Univ Hosp, Dept Med Res, Shenyang, Taiwan
[4] Vanung Univ, Dept Digital Multimedia Technol, Taoyuan, Taiwan
来源
ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS | 2017年 / 2卷
关键词
User authentication; QKD; smart card; elliptic curve cryptography;
D O I
10.1007/978-3-319-49106-6_27
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The quantum key distribution (QKD) protocols become the trend research in the computer security field today because those are very strong to prevent the eavesdropping during communication domain. In addition, an existence of the third party as the Trust Center (TC) presents the higher security level and the more effective key distribution such as 3QKDPMA and 3PAQKD-TB. The TC has responsibilities to construct the session key and to authenticate the user on a communication session. Moreover, the TC should have the high-security level to assure all communications done under the secure condition. The 3QKDPMA and 3PAQKD-TB provide the effective method for creating the session key. However, the basic QKD protocol mentioned in this paper do not provide the advanced user authentication. It is because TC only maintains the user's secret key table which is used to authenticate each legal user. To improve the basic QKD protocol, we propose a new scheme for QKD by elaborating the 3PAQKD-TB with the smart card secure user authentication. Finally, it is a lightweight computation approach in order to achieve more efficiently to the basic QKD protocol by using elliptic curve cryptography.
引用
收藏
页码:291 / 301
页数:11
相关论文
共 9 条
[1]  
[Anonymous], INT J NETWORK SECURI
[2]  
[Anonymous], 1997, Handbook of Applied Cryptography
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[5]  
Chen Hsing-Chung, 2012, 6 INT C INN MOB INT
[6]  
Hong-Bin Tang, 2013, International Journal of Network Security, V15, P446
[7]  
Hwang Tzonelih, 2007, IEEE T DEPENDABLE SE, V4
[8]  
Hwang Tzonelih, 1990, P IEEE REG 10 C COMP
[9]  
Scarani Valerio, THEORETICAL COMPUTER, V560, P27