Two-Party Mutual Authentication Quantum Key Agreement Protocol Based on Bell States

被引:0
|
作者
He Y. [1 ]
Di M. [1 ]
Pang Y. [1 ]
Yue Y. [1 ]
Li G. [1 ]
Liu J. [1 ]
机构
[1] School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an
关键词
Bell state; Entanglement exchange; Mutual identity authentication; Quantum cryptography; Quantum key agreement;
D O I
10.12178/1001-0548.2022008
中图分类号
学科分类号
摘要
In order to solve the problem of complicated steps and large communication volume caused by the participation of trusted or semi-trusted third parties in the existing mutual authentication quantum key agreement protocols, a new two-party quantum key agreement protocol is proposed based on Bell states and their entangled exchange properties. The key agreement protocol can realize identity mutual authentication and fair key agreement between participants without the participation of trusted or semi-trusted third parties, thus reducing the communication complexity of the protocol. The security analysis shows that its identity authentication process can resist impersonation attack, and its key agreement process can resist external attacks and participant attacks. In addition, compared with the existing mutual authentication quantum key agreement protocols, the quantum bit efficiency of the protocol is also higher, and its quantum state preparation and measurement are easier to achieve with existing technologies. © 2022, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
页码:488 / 492
页数:4
相关论文
共 21 条
  • [1] YANG X J, BALEANU D, MACHADO J., Mathematical aspects of the Heisenberg uncertainty principle within local fractional Fourier analysis, Boundary Value Problems, 1, (2013)
  • [2] NAGATA K, NAKAMURA T, FAROUK A, Et al., No-Cloning theorem, kochen-specker theorem, and quantum measurement theories, International Journal of Theoretical Physics, 58, 6, pp. 1845-1853, (2019)
  • [3] BENNETT C H, BRASSARD G., Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175-179, (1984)
  • [4] HE Y F, ZHAO Y K, GUO J R, Et al., Statistical fluctuation analysis of quantum key distribution protocols based on heralded pair coherent state, Chinese Journal of Lasers, 40, 7, (2020)
  • [5] ZHOU N, ZENG G, XIONG J., Quantum key agreement protocol, Electronics Letters, 40, 18, pp. 1149-1150, (2004)
  • [6] QIN L, LIU H J, ZHU L J, Et al., Quantum secret sharing using discretely modulated coherent states, Physical Review A, 103, 3, (2021)
  • [7] HE Y F, MA W P., Multiparty quantum secure direct communication immune to collective noise, Quantum Information Process, 18, 1, pp. 1-11, (2019)
  • [8] JI Z X, FAN P R, ZHANG H G, Et al., Cryptanalysis and improvement of several quantum private comparison protocols, Communications in Theoretical Physics, 72, 8, (2020)
  • [9] SUN S, ZHANG H., Double-Direction quantum cyclic controlled remote state preparation of two-qubit states, Quantum Information Processing, 20, 6, pp. 1-33, (2021)
  • [10] CHONG S K, HWANG T., Quantum key agreement protocol based on BB84, Optics Communications, 283, 6, pp. 1192-1195, (2010)