A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography

被引:4
|
作者
Shi, Wei-Min [1 ]
Zhang, Jan-Biao [1 ]
Zhou, Yi-Hua [1 ]
Yang, Yu-Guang [1 ]
Zhang, Xin-Lan [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
来源
OPTIK | 2016年 / 127卷 / 20期
基金
中国国家自然科学基金;
关键词
Quantum deniable authentication; Non-interactive; Quantum trapdoor one-way function; Asymmetric quantum cryptography;
D O I
10.1016/j.ijleo.2016.06.064
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to reduce the communication cost, a non-interactive quantum deniable authentication based on asymmetric quantum cryptography is proposed. In the new scheme, the sender and receiver without interaction first agree a sharing secret key by utilizing their public and private key and then the sender generates the authentication information according to the sharing secret key, similarly, the receiver can also generate the same authentication codes according to the sharing secret key. So the receiver cannot prove the source of the message to a third party but can identify the true source of a given message. Compared with our previous schemes based on interaction, this new scheme has the remarkable advantages of reducing the communication cost, lessening the difficulty and intensity of necessary operations, and without help of a trusted center. Finally, the security analysis results show that this new scheme also satisfies the same basic security requirements of deniable authentication protocol such as completeness, deniability, and can withstand forgery attack, impersonation attack and inter-resend attack. (C) 2016 Elsevier GmbH. All rights reserved.
引用
收藏
页码:8693 / 8697
页数:5
相关论文
共 50 条
  • [31] An efficient quantum deniable authentication protocol without a trusted center
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    Zhang, Jan-Biao
    [J]. OPTIK, 2016, 127 (16): : 6484 - 6489
  • [32] Non-interactive certificate update protocol for efficient authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
  • [33] A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
    Irakiza, David
    Karim, Md E.
    Phoha, Vir V.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1133 - 1140
  • [34] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu, Hongfeng
    Zhang, Yan
    [J]. Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [35] A restricted quantum deniable authentication protocol applied in electronic voting system
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Jiang, Nan
    [J]. OPTIK, 2017, 142 : 9 - 12
  • [36] Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,
  • [37] Cryptanalysis of a non-interactive deniable ring signature scheme
    Jia, Huiwen
    Tang, Chunming
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 103 - 112
  • [38] Cryptanalysis of a non-interactive deniable ring signature scheme
    Huiwen Jia
    Chunming Tang
    [J]. International Journal of Information Security, 2021, 20 : 103 - 112
  • [39] Non-interactive Classical Verification of Quantum Computation
    Alagic, Gorjan
    Childs, Andrew M.
    Grilo, Alex B.
    Hung, Shih-Han
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 153 - 180
  • [40] Non-interactive quantum homomorphic encryption scheme based on the rotation operator
    Wang, ShuoLin
    Shang, Tao
    Liu, JianWei
    [J]. SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2023, 53 (04)