Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party

被引:1
|
作者
Kanamori, Yoshito [1 ]
Hoanca, Bogdan [1 ]
Yoo, Seong-Moo [2 ]
机构
[1] Univ Alaska Anchorage, Dept Comp Informat Syst, Anchorage, AK 99508 USA
[2] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
quantum cryptography; authentication; authenticated key;
D O I
10.1109/GLOCOM.2008.ECP.354
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel three-party quantum authenticated key distribution with a partially trusted third party protocol is proposed. Unlike most classical cryptography, the security of the protocol does not rely on the amount of computations required to find the encryption key, but on physical properties of the transmission medium (i.e., quantum mechanical properties). The session key shared between participants is concealed from the trusted third party while the participants trust the third party regarding the authentication part. Thus, the proposed system will be preferable for network systems in/between institutions, which deal with highly sensitive information (e.g., military bases, research facilities, hospitals).
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Three-party quantum summation without a trusted third party
    Zhang, Cai
    Sun, Zhi-Wei
    Huang, Xiang
    Long, Dong-Yang
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (02)
  • [2] A practical protocol for three-party authenticated quantum key distribution
    D. J. Guan
    Yuan-Jiun Wang
    E. S. Zhuang
    Quantum Information Processing, 2014, 13 : 2355 - 2374
  • [3] A practical protocol for three-party authenticated quantum key distribution
    Guan, D. J.
    Wang, Yuan-Jiun
    Zhuang, E. S.
    QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2355 - 2374
  • [4] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [5] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [6] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [7] Authenticated public key distribution scheme without trusted third party
    Koo, JH
    Kim, BH
    Lee, DH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 926 - 935
  • [8] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [9] Three-party authenticated key agreements for optimal communicatione
    Lee, Tian-Fu
    Hwang, Tzonelih
    PLOS ONE, 2017, 12 (03):
  • [10] Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
    Liu, I-Cheng
    Hwang, Tzonelih
    Wei, Hsu-Chen
    QUANTUM INFORMATION PROCESSING, 2023, 22 (08)