检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Li YANG Chenmiao WU Huiqin XIE
机构地区:[1]State Key Laboratory of Information Security, Institute of Information Engineering,Chinese Academy of Sciences [2]Data Assurance and Communication Security Research Center,Chinese Academy of Sciences [3]School of Cyber Security, University of Chinese Academy of Sciences
出 处:《Science China(Information Sciences)》2018年第2期212-219,共8页中国科学(信息科学)(英文版)
基 金:supported by National Natural Science Foundation of China(Grant No.61672517);National Cryptography Development Fund(Grant No.MMJJ20170108);National Key Research and Development Program of China(Grant No.2017YFB0802502);Fundamental Theory and Cutting Edge Technology Research Program of Institute of Information Engineering,CAS(Grant No.Y7Z0301103)
摘 要:In this paper, we realize Shamir's no-key protocol via quantum computation of Boolean functions and a private quantum channel. The proposed quantum no-key protocol has three rounds and provides mutual data origin authentication. Random Boolean functions are used to create entanglement and guarantee that any adversary without keys cannot pass the authentication. Thus, our protocol can resist the manin-the-middle attack. A security analysis has shown that pieces of ciphertexts of the three rounds are completely mixed state. This property ensures no adversary can get any information about the sent message or authentication keys. Therefore, our protocol is unconditionally secure and its authentication keys can be reused.In this paper, we realize Shamir's no-key protocol via quantum computation of Boolean functions and a private quantum channel. The proposed quantum no-key protocol has three rounds and provides mutual data origin authentication. Random Boolean functions are used to create entanglement and guarantee that any adversary without keys cannot pass the authentication. Thus, our protocol can resist the manin-the-middle attack. A security analysis has shown that pieces of ciphertexts of the three rounds are completely mixed state. This property ensures no adversary can get any information about the sent message or authentication keys. Therefore, our protocol is unconditionally secure and its authentication keys can be reused.
关 键 词:quantum cryptography no-key protocol quantum entanglement information-theoretical security private quantum channel
分 类 号:TN918.4[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15