A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography

被引:4
|
作者
Shi, Wei-Min [1 ]
Zhang, Jan-Biao [1 ]
Zhou, Yi-Hua [1 ]
Yang, Yu-Guang [1 ]
Zhang, Xin-Lan [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
来源
OPTIK | 2016年 / 127卷 / 20期
基金
中国国家自然科学基金;
关键词
Quantum deniable authentication; Non-interactive; Quantum trapdoor one-way function; Asymmetric quantum cryptography;
D O I
10.1016/j.ijleo.2016.06.064
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to reduce the communication cost, a non-interactive quantum deniable authentication based on asymmetric quantum cryptography is proposed. In the new scheme, the sender and receiver without interaction first agree a sharing secret key by utilizing their public and private key and then the sender generates the authentication information according to the sharing secret key, similarly, the receiver can also generate the same authentication codes according to the sharing secret key. So the receiver cannot prove the source of the message to a third party but can identify the true source of a given message. Compared with our previous schemes based on interaction, this new scheme has the remarkable advantages of reducing the communication cost, lessening the difficulty and intensity of necessary operations, and without help of a trusted center. Finally, the security analysis results show that this new scheme also satisfies the same basic security requirements of deniable authentication protocol such as completeness, deniability, and can withstand forgery attack, impersonation attack and inter-resend attack. (C) 2016 Elsevier GmbH. All rights reserved.
引用
收藏
页码:8693 / 8697
页数:5
相关论文
共 50 条
  • [1] Non-interactive deniable authentication protocol based on factoring
    Lu, RX
    Cao, ZF
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) : 401 - 405
  • [2] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    [J]. NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
  • [3] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [4] Non-interactive deniable ring authentication
    Susilo, W
    Mu, Y
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401
  • [5] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [6] Non-interactive identity based deniable authentication scheme
    Kuo, Wen-Chung
    Huang, Yu-Chih
    [J]. PROCEEDING OF THE SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2008, 7 : 353 - 356
  • [7] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [8] Efficient non-interactive deniable authentication protocols
    Qian, HF
    Cao, ZF
    Wang, LC
    Xue, QS
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 673 - 679
  • [9] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    [J]. Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [10] Quantum deniable authentication protocol
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (07) : 1501 - 1510