An Authenticated Quantum Dialog Protocol with Three-Particle Entangled States Using Subset of Intersection Method
- PDF / 1,184,508 Bytes
- 12 Pages / 439.37 x 666.142 pts Page_size
- 8 Downloads / 199 Views
An Authenticated Quantum Dialog Protocol with Three-Particle Entangled States Using Subset of Intersection Method Hongfeng Zhu 1 & Yuanle Zhang 1 Received: 7 February 2020 / Accepted: 29 June 2020/ # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
In this paper, we propose a mutual authenticated quantum key agreement scheme based on three-particle entangled states, which can achieve both completely secure and more efficient. In our scheme, the shared keys are classical bit strings between the trusted third party Charlie and the client (Alice or Bob), so they are kept and use to authenticate each other easily. More important, by the Charlie’s helping with three-particle entangled states using subset of intersection method, Charlie and Alice/Bob can authenticate each other, and at the same time anyone else cannot get the session key between Alice and Bob even Charlie. The proposed scheme has the properties of completeness, information theoretic security, non-repudiation and unforgeability. Its information-theoretic security is ensured by quantum indistinguishability mechanics. On the other hand, our scheme is more efficient than the similar schemes. Keywords Key agreement . Quantum authentication . Three-particle entangled
1 Introduction At present, quantum communication, quantum computing and other quantum related technologies have received more attention. A lot of researches have been carried out on their security. In the study of quantum cryptography, quantum entanglement plays a vital role. Among them, in the proof of the unconditional security of the quantum key distribution protocol, H.K.Lo and H.F.Chau [1] pioneered the equivalent conversion of the BB84 protocol into a quantum entanglement-based key distribution protocol, thereby solving this long-standing problem in the field of quantum cryptography. Further, M.Curty [2] Proved that quantum entanglement is a prerequisite for achieving secure quantum key distribution. In fact, in the research of * Hongfeng Zhu [email protected]; [email protected]
1
Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang P.C 110034, China
International Journal of Theoretical Physics
quantum key negotiation, quantum cryptography, and even the whole quantum information technology, quantum entanglement is used as a new resource to complete the difficult task in the classic world. In these studies, quantum entanglement as a resource can not only carry information by itself, but can also be used to help reduce the complexity of classical communication. According to the previous analysis, many existing controlled quantum dialogue (CQD) protocols which is secure against the conspiring attack from the users without the controller’s permission was put forward. However, it is found that this CQD protocol is weak against the different initial state (DIS) attack and the denial-of-service (DoS) attack from the dishonest controller. So CQD protocaols have security problems and low efficiency problems, but i
Data Loading...