Identity based secure authentication scheme based on quantum key distribution for cloud computing

被引:21
|
作者
Sharma, Geeta [1 ]
Kalra, Sheetal [1 ]
机构
[1] Guru Nanak Dev Univ, Reg Campus, Jalandhar, Punjab, India
关键词
Authentication; Cloud computing; EPR pair; Quantum authentication; Quantum key distribution; ID-BASED ENCRYPTION; DIRECT COMMUNICATION;
D O I
10.1007/s12083-016-0528-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user's account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.
引用
收藏
页码:220 / 234
页数:15
相关论文
共 50 条
  • [1] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [2] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [3] Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing
    Goumidi, Hadjer
    Harous, Saad
    Aliouat, Zibouda
    Gueroui, Abdelhak Mourad
    [J]. SYMMETRY-BASEL, 2021, 13 (03):
  • [4] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02) : 254 - 259
  • [5] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [6] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    [J]. SYMMETRY-BASEL, 2020, 12 (01):
  • [7] An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
    Akram, Waseem
    Mahmood, Khalid
    Li, Xiong
    Sadiq, Mazhar
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER NETWORKS, 2022, 217
  • [8] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [9] Dyanimc Key based Authentication Scheme for Vehicular Cloud Computing
    Sharma, Manish Kumar
    Bali, Rasmeet S.
    Kaur, Arvinder
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1059 - 1064
  • [10] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578