Lightweight Authentication for Quantum Key Distribution

被引:17
|
作者
Kiktenko, Evgeniy O. [1 ,2 ,3 ]
Malyshev, Aleksei O. [1 ]
Gavreev, Maxim A. [1 ,2 ]
Bozhedarov, Anton A. [1 ,4 ]
Pozhar, Nikolay O. [1 ]
Anufriev, Maxim N. [1 ]
Fedorov, Aleksey K. [1 ,2 ]
机构
[1] Russian Quantum Ctr, Moscow 143025, Russia
[2] Moscow Inst Phys & Technol, Dolgoprudnyi 141700, Russia
[3] Russian Acad Sci, Steklov Math Inst, Dept Math Methods Quantum Technol, Moscow 119991, Russia
[4] Skolkovo Inst Sci & Technol, Moscow 121205, Russia
基金
俄罗斯基础研究基金会;
关键词
Authentication; Recycling; Protocols; Hash functions; Encryption; Quantum key distribution; quantum cryptography; communication system security; SECURITY;
D O I
10.1109/TIT.2020.2989459
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum key distribution (QKD) enables unconditionally secure communication between distinct parties using a quantum channel and an authentic public channel. Reducing the portion of quantum-generated secret keys, that is consumed during the authentication procedure, is of significant importance for improving the performance of QKD systems. In the present work, we develop a lightweight authentication protocol for QKD based on a 'ping-pong' scheme of authenticity check for QKD. An important feature of this scheme is that the only one authentication tag is generated and transmitted during each of the QKD post-processing rounds. For the tag generation purpose, we design an unconditionally secure procedure based on the concept of key recycling. The procedure is based on the combination of almost universal(2) polynomial hashing, XOR universal(2) Toeplitz hashing, and one-time pad (OTP) encryption. We demonstrate how to minimize both the length of the recycled key and the size of the authentication key, that is required for OTP encryption. As a result, in real case scenarios, the portion of quantum-generated secret keys that is consumed for the authentication purposes is below 1%. Finally, we provide a security analysis of the full quantum key growing process in the framework of universally composable security.
引用
收藏
页码:6354 / 6368
页数:15
相关论文
共 50 条
  • [41] A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States
    张盛
    王剑
    唐朝京
    张权
    [J]. Communications in Theoretical Physics, 2011, 56 (08) : 268 - 272
  • [42] A lightweight authentication and key agreement scheme for Internet of Drones
    Zhang, Yunru
    He, Debiao
    Li, Li
    Chen, Biwen
    [J]. COMPUTER COMMUNICATIONS, 2020, 154 : 455 - 464
  • [43] An Efficient Lightweight Key Agreement and Authentication Scheme for WBAN
    Rehman, Zia Ur
    Altaf, Saud
    Iqbal, Saleem
    [J]. IEEE ACCESS, 2020, 8 : 175385 - 175397
  • [44] A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT
    He, Daojing
    Cai, Yanchang
    Zhu, Shanshan
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (11) : 7862 - 7872
  • [45] Attacks on quantum key distribution protocols that employ non-ITS authentication
    C. Pacher
    A. Abidin
    T. Lorünser
    M. Peev
    R. Ursin
    A. Zeilinger
    J.-Å. Larsson
    [J]. Quantum Information Processing, 2016, 15 : 327 - 362
  • [46] A theoretical scheme for multi-user quantum authentication and key distribution in a network
    Yang, YG
    Wen, QY
    Zhu, FC
    [J]. ACTA PHYSICA SINICA, 2005, 54 (09) : 3995 - 3999
  • [47] Attacks on quantum key distribution protocols that employ non-ITS authentication
    Pacher, C.
    Abidin, A.
    Loruenser, T.
    Peev, M.
    Ursin, R.
    Zeilinger, A.
    Larsson, J. -A.
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (01) : 327 - 362
  • [48] Verifiable Quantum Key Exchange with Authentication
    Run-hua Shi
    Bai Liu
    Mingwu Zhang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 227 - 242
  • [49] Verifiable Quantum Key Exchange with Authentication
    Shi, Run-hua
    Liu, Bai
    Zhang, Mingwu
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (01) : 227 - 242
  • [50] Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
    Dong Y.-D.
    Peng J.-Y.
    Zhang X.-B.
    Zhang Z.-L.
    [J]. Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 151 - 156