Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party

被引:1
|
作者
Kanamori, Yoshito [1 ]
Hoanca, Bogdan [1 ]
Yoo, Seong-Moo [2 ]
机构
[1] Univ Alaska Anchorage, Dept Comp Informat Syst, Anchorage, AK 99508 USA
[2] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
quantum cryptography; authentication; authenticated key;
D O I
10.1109/GLOCOM.2008.ECP.354
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel three-party quantum authenticated key distribution with a partially trusted third party protocol is proposed. Unlike most classical cryptography, the security of the protocol does not rely on the amount of computations required to find the encryption key, but on physical properties of the transmission medium (i.e., quantum mechanical properties). The session key shared between participants is concealed from the trusted third party while the participants trust the third party regarding the authentication part. Thus, the proposed system will be preferable for network systems in/between institutions, which deal with highly sensitive information (e.g., military bases, research facilities, hospitals).
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Three-party reference frame independent quantum key distribution protocol
    Comfort Sekga
    Mhlambululi Mafu
    Chinese Physics B, 2021, 30 (12) : 61 - 71
  • [22] Three-party reference frame independent quantum key distribution protocol*
    Sekga, Comfort
    Mafu, Mhlambululi
    CHINESE PHYSICS B, 2021, 30 (12)
  • [23] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [24] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [25] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [26] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
    Sinha, Vivek Kumar
    Anand, Divya
    Alharithi, Fahd S.
    Almulihi, Ahmed H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
  • [27] Three-party password authenticated key agreement resistant to server compromise
    Kwon, Taekyoung
    Lee, Dong Hoon
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 312 - +
  • [28] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [29] Yet Another Certificateless three-party authenticated key agreement protocol
    Hu, Jianbin
    Xiong, Hu
    Guan, Zhi
    Tang, Cong
    Wang, Yonggang
    Xin, Wei
    Chen, Zhong
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 222 - 226
  • [30] Chaotic map-based three-party authenticated key agreement
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2469 - 2474