Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party

被引:1
|
作者
Kanamori, Yoshito [1 ]
Hoanca, Bogdan [1 ]
Yoo, Seong-Moo [2 ]
机构
[1] Univ Alaska Anchorage, Dept Comp Informat Syst, Anchorage, AK 99508 USA
[2] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
quantum cryptography; authentication; authenticated key;
D O I
10.1109/GLOCOM.2008.ECP.354
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel three-party quantum authenticated key distribution with a partially trusted third party protocol is proposed. Unlike most classical cryptography, the security of the protocol does not rely on the amount of computations required to find the encryption key, but on physical properties of the transmission medium (i.e., quantum mechanical properties). The session key shared between participants is concealed from the trusted third party while the participants trust the third party regarding the authentication part. Thus, the proposed system will be preferable for network systems in/between institutions, which deal with highly sensitive information (e.g., military bases, research facilities, hospitals).
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [32] Security analysis and enhancements of a three-party authenticated key agreement protocol
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    ACTA SCIENTIARUM-TECHNOLOGY, 2015, 37 (03) : 329 - 336
  • [33] A Smart Card-Based Three-Party Quantum Key Distribution Protocol
    Wijayantol, Heri
    Chen, Hsing-Chung
    Lin, Wen Yen
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 291 - 301
  • [34] Three-party quantum key agreement with Bell states
    Yin Xun-Ru
    Ma Wen-Ping
    Shen Dong-Su
    Wang Li-Li
    ACTA PHYSICA SINICA, 2013, 62 (17)
  • [35] Universally composal ble three-party key distribution
    Chang, TingMao
    Zhu, YueFei
    Zhou, Jin
    Zhang, YaJuan
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 408 - +
  • [36] Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
    Gao, Fei
    Qin, Su-Juan
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) : 630 - 635
  • [37] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2013, 14 (05) : 347 - 355
  • [38] Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol
    Wu, Shuhua
    Chen, Kefei
    Zhu, Yuefei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (03) : 215 - 221
  • [39] Robust biometric-based three-party authenticated key establishment protocols
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (06) : 1144 - 1157
  • [40] TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
    QIAO, Hui
    DONG, Xuewen
    SHEN, Yulong
    LIU, Haozhe
    YANG, Lingxiao
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 686 - 696