Identity based secure authentication scheme based on quantum key distribution for cloud computing

被引:21
|
作者
Sharma, Geeta [1 ]
Kalra, Sheetal [1 ]
机构
[1] Guru Nanak Dev Univ, Reg Campus, Jalandhar, Punjab, India
关键词
Authentication; Cloud computing; EPR pair; Quantum authentication; Quantum key distribution; ID-BASED ENCRYPTION; DIRECT COMMUNICATION;
D O I
10.1007/s12083-016-0528-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user's account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.
引用
收藏
页码:220 / 234
页数:15
相关论文
共 50 条
  • [21] Quantum Identity Authentication Scheme Based on Quantum Walks on Graphs with IBM Quantum Cloud Platform
    Lou, Xiaoping
    Wang, Sheng
    Ren, Shaoxuan
    Zan, Huiru
    Xu, Xuejiao
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (02)
  • [22] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [23] A Secure Certificateless Identity Authentication Scheme Based on Blockchain
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Xu, Ming
    [J]. TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 251 - 266
  • [24] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [25] Secure Key Authentication Scheme Based on Discrete Logarithms
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. NWESP 2007: THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2007, : 73 - +
  • [26] A secure quantum key distribution scheme based on variable quantum encoding algorithms
    赵志文
    罗翼
    赵章骥
    龙海明
    [J]. Chinese Optics Letters, 2011, 9 (03) : 77 - 79
  • [27] Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
    YANG Yanyan
    HU Mingsheng
    KONG Shan
    GONG Bei
    LIU Xinxin
    [J]. Wuhan University Journal of Natural Sciences, 2019, 24 (02) : 134 - 140
  • [28] A secure quantum key distribution scheme based on variable quantum encoding algorithms
    Zhao, Zhiwen
    Luo, Yi
    Zhao, Zhangji
    Long, Haiming
    [J]. CHINESE OPTICS LETTERS, 2011, 9 (03)
  • [29] An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication
    Liu Wen-Jie
    Chen Han-Wu
    Ma Ting-Huai
    Li Zhi-Qiang
    Liu Zhi-Hao
    Hu Wen-Bo
    [J]. CHINESE PHYSICS B, 2009, 18 (10) : 4105 - 4109
  • [30] An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication
    刘文杰
    陈汉武
    马廷淮
    李志强
    刘志昊
    胡文博
    [J]. Chinese Physics B, 2009, 18 (10) : 4105 - 4109