Identity based secure authentication scheme based on quantum key distribution for cloud computing

被引:21
|
作者
Sharma, Geeta [1 ]
Kalra, Sheetal [1 ]
机构
[1] Guru Nanak Dev Univ, Reg Campus, Jalandhar, Punjab, India
关键词
Authentication; Cloud computing; EPR pair; Quantum authentication; Quantum key distribution; ID-BASED ENCRYPTION; DIRECT COMMUNICATION;
D O I
10.1007/s12083-016-0528-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user's account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.
引用
收藏
页码:220 / 234
页数:15
相关论文
共 50 条
  • [41] Secure Pattern-Key Based Password Authentication Scheme
    Zaki, M. Hamza
    Husain, Adil
    Umar, M. Sarosh
    Khan, Muneeb H.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2017, : 171 - 174
  • [42] A secure key authentication scheme for cryptosystems based on GDLP and IFP
    Chandrashekhar Meshram
    Cheng-Chi Lee
    Chun-Ta Li
    Chin-Ling Chen
    [J]. Soft Computing, 2017, 21 : 7285 - 7291
  • [43] A secure key authentication scheme for cryptosystems based on GDLP and IFP
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    [J]. SOFT COMPUTING, 2017, 21 (24) : 7285 - 7291
  • [44] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [45] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [46] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Mariem Bouchaala
    Cherif Ghazel
    Leila Azouz Saidane
    [J]. The Journal of Supercomputing, 2022, 78 : 497 - 522
  • [47] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 497 - 522
  • [48] A Fully Secure Identity Based Encryption Scheme with Equality Test in The Standard Model in Cloud Computing
    Zhou, Zijun
    Liao, Yongjian
    Zhang, Ganglin
    Gan, Tingyun
    Zhou, Shijie
    [J]. International Journal of Network Security, 2022, 24 (05) : 841 - 854
  • [49] A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States
    Zhang Sheng
    Wang Jian
    Tang Chao-Jing
    Zhang Quan
    [J]. COMMUNICATIONS IN THEORETICAL PHYSICS, 2011, 56 (02) : 268 - 272
  • [50] A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States
    张盛
    王剑
    唐朝京
    张权
    [J]. Communications in Theoretical Physics, 2011, 56 (08) : 268 - 272