Font Size: a A A

Quantum Key Agreement With Authentication

Posted on:2022-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y T WuFull Text:PDF
GTID:2480306752969189Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Quantum cryptography is an intersecting research field created by the combination of classical cryptography and quantum mechanics.Different from classical cryptography,in quantum cryptography,the security of information is protected by the basic principles of quantum mechanics,which has theoretical unconditional security.Nowadays,the field of quantum cryptography has extended a number of research branches,such as quantum key agreement,quantum key distribution,quantum secret sharing,quantum secure summation,and quantum secure direct communication,etc.Key agreement refers to the negotiation of two or more entities to jointly establish a session key.The outcome of the negotiation is jointly influenced by each participant.Quantum key agreement is a quantum version of classical key agreement.In quantum key agreement protocols,it is required that the negotiated key cannot be independently determined or predicted by any participant in the agreement and meet the fairness condition.Second,in the absence of external eavesdropping,it can be ensured that each participant receives the correct information and cannot obtain private input from other participants.Finally,external eavesdroppers cannot obtain the negotiated key without being detected.In addition to the above-mentioned security requirements,in practical applications,it is often necessary to consider the issue of participant identity authentication.This is because participants are often at different ends of the network,so external eavesdroppers can participate in the agreement by impersonating legitimate participants,and ultimately steal the negotiation key.Obviously,by authenticating the real identities of the participants,such counterfeit attacks can be effectively prevented.Therefore,this paper considers the issue of participant identity authentication,and designs two multi-party quantum key agreement protocols with authentication functions,namely:1.Tree-type quantum key agreement protocol with authentication.Utilizing the advantage of quantum entanglement swapping,a multi-party quantum key agreement protocol with authentication is proposed.In this protocol,a semi-trusted third party is introduced,who prepares Bell states,and sends one particle to multiple participants respectively.After that the participants can share a Greenberger-Horne-Zeilinger state by entanglement swapping.Finally,these participants measure the particles in their hands and obtain an agreement key.Here,classical hash function and Hadamard operation are utilized to authenticate the identity of participants.The correlations of GHZ states ensure the security of the proposed protocol.To illustrated it detailly,the security of this protocol against common attacks is analyzed,which shows that the proposed protocol is secure in theory.2.Travel-mode quantum key agreement protocol with authentication.According to the characteristics of transmission of travel-mode,a travel-mode quantum key agreement protocol with authentication is proposed.In this protocol,participants generate Bell states and use them as transmitting signal particle sequences.The signal particle sequences are transmitted in a circular manner.After that,the participants sequentially encode their own identity information and private key information.Finally,after these participants decode the identity information,the Bell state sequence in the opponent is measured,and the measurement result is the final negotiated key.In this protocol,two Pauli operators are used to encode the private key information.In addition,the classic hash function and rotation operation are used to authenticate the identity of the participants.The security analysis of the protocol shows that the travel-mode quantum key agreement protocol can successfully resist the collusive attack of dishonest participants.Besides,the security analysis also shows that the proposed protocol is secure against other common attacks,which shows that the proposed protocol is secure in theory.
Keywords/Search Tags:Quantum cryptography, quantum key agreement, identity authentication, entangled states, security, fairness
PDF Full Text Request
Related items