A practical protocol for three-party authenticated quantum key distribution

被引:0
|
作者
D. J. Guan
Yuan-Jiun Wang
E. S. Zhuang
机构
[1] National Sun Yat-sen University,Department of Computer Science and Engineering
[2] National Chung Hsing University,Department of Computer Science and Engineering
来源
关键词
Quantum cryptography; Quantum key distribution; Three-party key distribution protocol; Provable security; Standard problem reduction;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Hwang et al. proposed two three-party authenticated quantum key distribution protocols for two communicating parties to establish a session key via a trusted center. They also showed their protocols were secure by using random oracle model. However, their protocols were designed to run in an ideal world. In this paper, we present a more practical protocol by considering some issues, which have not been addressed in their protocols. These issues include (1) session key consistence, (2) online guessing attack, and (3) noise in quantum channels. To deal with these issues, we use error correction code and key evolution. We also give a formal proof for the security of our protocols by using standard reduction, instead of the random oracle model.
引用
收藏
页码:2355 / 2374
页数:19
相关论文
共 50 条
  • [1] A practical protocol for three-party authenticated quantum key distribution
    Guan, D. J.
    Wang, Yuan-Jiun
    Zhuang, E. S.
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2355 - 2374
  • [2] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2017, 16
  • [3] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [4] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [5] Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
    Kanamori, Yoshito
    Hoanca, Bogdan
    Yoo, Seong-Moo
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [7] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [8] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [9] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 600 - 603
  • [10] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    [J]. Int. Rev. Comput. Softw., 7 (3633-3638):