Multiparty simultaneous quantum identity authentication with secret sharing  被引量:13

Multiparty simultaneous quantum identity authentication with secret sharing

在线阅读下载全文

作  者:YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and Technology,Beijing University of Technology,Beijing 100022,China 2 State Key Laboratory of Information Security (Graduate University of the Chinese Academy of Sciences),Beijing 100049,China 3 School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,China 4 Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China 5 Trusted Computing Laboratory,Beijing University of Technology,Beijing 100022,China 

出  处:《Science China(Physics,Mechanics & Astronomy)》2008年第3期321-327,共7页中国科学:物理学、力学、天文学(英文版)

基  金:the National Basic Research Program of China (973 Program) (Grant No. 2007CB311100);the National High Technology Research and Development Program of China (Grant Nos. 2006AA01Z419 and 20060101Z4015);the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90604023);the Scientific Research Common Program of Beijing Municipal Commission of Education (Grant No. KM200810005004);the Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No. 97007016200701);the National Research Foundation for the Doctoral Program of Higher Education of China (Grant No. 20040013007);the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601);the Doctor Scientific Research Activation Foundation of Beijing University of Technology (Grant No. 52007016200702)

摘  要:Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially. At last,the TTP can judge whether the impersonator exists. The sec-ond protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technol-ogy.Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol, the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA, the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share, each user performs the corresponding unitary operations on the single photon sequence sequentially. At last, the TTP can judge whether the impersonator exists. The second protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technology.

关 键 词:QUANTUM IDENTITY authentication SECRET SHARING QUANTUM CRYPTOGRAPHY 

分 类 号:O413[理学—理论物理]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象