A novel quantum deniable authentication protocol without entanglement

被引:0
|
作者
Wei-Min Shi
Jian-Biao Zhang
Yi-Hua Zhou
Yu-Guang Yang
机构
[1] Beijing University of Technology,College of Computer Science and Technology
来源
关键词
Quantum deniable authentication; Single photons; Quantum one-way function;
D O I
暂无
中图分类号
学科分类号
摘要
A novel quantum deniable authentication protocol based on single photons is proposed. In this scheme, the message sender and the specified receiver will first agree a new shared secret key by key update phases with the help of a third center, where only they can encrypt and decrypt the message by using the new shared secret key. Hence, this scheme can guarantee that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Compared with our previous scheme (Shi et al. in Quantum Inf Process 13:1501–1510, 2014), this scheme has the remarkable advantages of the higher qubit efficiency and consuming fewer quantum resources. Finally, security analysis results show that this scheme satisfies known key security and the basic security requirements of deniable authentication protocol such as completeness and deniability, and can withstand forgery attack, impersonation attack and inter-resend attack.
引用
收藏
页码:2183 / 2193
页数:10
相关论文
共 50 条
  • [31] A novel deniable authentication protocol using generalized ElGamal signature scheme
    Lee, Wei-Bin
    Wu, Chia-Chun
    Tsaur, Woei-Jiunn
    INFORMATION SCIENCES, 2007, 177 (06) : 1376 - 1381
  • [32] Quantum Mutual Implicit Authentication Key Agreement Protocol without Entanglement with Key Recycling
    Xu, Yuguang
    Zhang, Lu
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2023, 62 (11)
  • [33] Quantum Mutual Implicit Authentication Key Agreement Protocol without Entanglement with Key Recycling
    Yuguang Xu
    Lu Zhang
    Hongfeng Zhu
    International Journal of Theoretical Physics, 62
  • [34] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Li, Fagen
    Takagi, Tsuyoshi
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1391 - 1398
  • [35] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Fagen Li
    Tsuyoshi Takagi
    Wireless Personal Communications, 2013, 69 : 1391 - 1398
  • [36] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [37] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    Journal of Electronic Science and Technology, 2018, 16 (02) : 139 - 144
  • [38] Secure deniable authentication protocol based on ElGamal cryptography
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +
  • [39] A simple protocol for deniable authentication based on ElGamal cryptography
    Wang, YJ
    Li, JH
    Tie, L
    NETWORKS, 2005, 45 (04) : 193 - 194
  • [40] A new deniable authentication protocol from bilinear pairings
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 954 - 961