Font Size: a A A

Research On Quantum Identity Authentication

Posted on:2013-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:H TangFull Text:PDF
GTID:2230330371958481Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The quantum key distribution (QKD) protocols don’t provide authentication function and can’t resist man-in-the-middle attack. Identity authentication is one of the important parts for a information security system. With the improvement of computing power, the classic authentication schemes based on algorithm complexity will be broken easily. Quantum cryptography communication system also needs identity authentication to provide security assurance, so researchers begin to study quantum identity authentication. Quantum identity authentication schemes are mostly based on single-photon state measurement and entangled state measurement.A quantum identity authentication and key distribution scheme based on quantum one-way function is proposed. The scheme can achieve identity authentication at same time efficiently distribute quantum key. Some technologies such as information-splitting, quantum one-way function and non-orthogonal single-photon state measurement are used in the scheme to ensure safety. In practical application, the technologies and quantum states used in the scheme are implemented easily.For the“users-server”model in the remote access system, a register and login authentication scheme based on quantum entanglement in the“users-server”system is proposed. The scheme uses the entangled state measurement and correlations of measurements to achieve the purpose of transferring the register and login authentication information between users and server. The register information is encrypted by the method of quantum encryption to protect the information in server.After analysis about the security of Aeronautical Telecommunication Network (ATN), an ATN identity authentication model that use quantum identity authentication scheme is proposed. The model based on trust structure provides authentication services for subnet and cross-subnet.To verify the correctness and feasibility of the two schemes, quantum computation and quantum states are simulated according to quantum mechanics. The communication process and quantum state changes of the two schemes are reflected in quantum simulation. Illegal party behavior is also simulated. The process of how to expose illegal party and data changes is reflected through the simulation. The simulation makes a comparison between efficient quantum key distribution part in the first scheme and BB84 quantum key distribution protocol. The efficient quantum key distribution improves the utilization of quantum states.
Keywords/Search Tags:quantum identity authentication, quantum key distribution, quantum one-way function, Aeronautical Telecommunication Network, quantum simulation
PDF Full Text Request
Related items