Font Size: a A A

Two-way Quantum Identity Authrntication Protocol Based On Single Photon With The Formal Security Analysis

Posted on:2021-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhaoFull Text:PDF
GTID:2480306470967939Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of quantum communication in recent years,quantum secure communication is one of the research directions been focused.Identity authentication before communication bears the important responsibility of ensuring the legality of communication.Quantum Identity Authentication(QIA)is an important step to confirm the legitimacy of the communication user before quantum communication and key distribution,thus the quantum identity authentication protocol with detailed and complete process are particularly important;at the same time,with the construction of quantum base stations are completing,differences of user's capabilities in quantum networks continuing to emerge,caused the considering of user's different quantum capabilities before identity authentication became necessary;on the other hand,in the complete QIA protocol,the security probability analysis of the protocol is also an important component.Overall,the current developments in the security analysis of quantum cryptography are slower than other relevant directions,but in recent years,the formal analysis of quantum communication protocols has gradually become a hot spot in the quantum field,new attempts including Petri technology and model detection have also appeared in the research direction.How to apply these methods in the security analysis of QIA protocol is worth trying;In view of the shortcomings of the existing QIA protocol,we have proposed a quantum identity authentication protocol that can achieve two-way synchronization based on a single photon.The specific contents are as follows:(1)A specific protocol strategy involving Trusted Third Party(TTP)has been proposed.The protocol preparation phase combines the idea of the Kerberos classic cryptographic protocol to an authentication process established based on quantum tickets.In the authentication phase,a new and efficient coding method is adopted.Synchronous authentication is achieved through the strategy of repeated throwing back on same photon;and a complete two-way authentication process is achieved through sharing information only once at preparation step.(2)Considering the different quantum capabilities and communication environments that users may have,the complete QIA protocol in the semi-quantum communication environment based on the same strategy but with improved processes was added,and bidirectional synchronization is also achieved in certification at the semi-quantum environment.(3)The traditional mathematical probability calculation and formal analysis based on probabilistic model detection were both carried out on the different attack methods faced in the identity authentication protocol,and these two methods were compared and summarized;the Prism tool is used in probabilistic model detection for establishing different module parts,finally the predict provable security of the protocol was obtained.(4)The principle for extending the protocol to multiple users was added,and the idea of "temporary base station" was proposed to improve the independence and privacy of multi-user authentication in quantum networks.
Keywords/Search Tags:Quantum communication, Single photon, Identity authentication, Semi-quantum, Prism
PDF Full Text Request
Related items