Mutual authenticated quantum no-key encryption scheme over private quantum channel  被引量:2

Mutual authenticated quantum no-key encryption scheme over private quantum channel

在线阅读下载全文

作  者:Li YANG Chenmiao WU Huiqin XIE 

机构地区:[1]State Key Laboratory of Information Security, Institute of Information Engineering,Chinese Academy of Sciences [2]Data Assurance and Communication Security Research Center,Chinese Academy of Sciences [3]School of Cyber Security, University of Chinese Academy of Sciences

出  处:《Science China(Information Sciences)》2018年第2期212-219,共8页中国科学(信息科学)(英文版)

基  金:supported by National Natural Science Foundation of China(Grant No.61672517);National Cryptography Development Fund(Grant No.MMJJ20170108);National Key Research and Development Program of China(Grant No.2017YFB0802502);Fundamental Theory and Cutting Edge Technology Research Program of Institute of Information Engineering,CAS(Grant No.Y7Z0301103)

摘  要:In this paper, we realize Shamir's no-key protocol via quantum computation of Boolean functions and a private quantum channel. The proposed quantum no-key protocol has three rounds and provides mutual data origin authentication. Random Boolean functions are used to create entanglement and guarantee that any adversary without keys cannot pass the authentication. Thus, our protocol can resist the manin-the-middle attack. A security analysis has shown that pieces of ciphertexts of the three rounds are completely mixed state. This property ensures no adversary can get any information about the sent message or authentication keys. Therefore, our protocol is unconditionally secure and its authentication keys can be reused.In this paper, we realize Shamir's no-key protocol via quantum computation of Boolean functions and a private quantum channel. The proposed quantum no-key protocol has three rounds and provides mutual data origin authentication. Random Boolean functions are used to create entanglement and guarantee that any adversary without keys cannot pass the authentication. Thus, our protocol can resist the manin-the-middle attack. A security analysis has shown that pieces of ciphertexts of the three rounds are completely mixed state. This property ensures no adversary can get any information about the sent message or authentication keys. Therefore, our protocol is unconditionally secure and its authentication keys can be reused.

关 键 词:quantum cryptography no-key protocol quantum entanglement information-theoretical security private quantum channel 

分 类 号:TN918.4[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象