Comment on "A practical protocol for three-party authenticated quantum key distribution"

被引:1
|
作者
Luo, Yi-Ping [1 ]
Chou, Wen-Han [2 ]
Hwang, Tzonelih [2 ]
机构
[1] CyberTrust Technol Inst, Inst Informat Ind, 116 Fu Yang St, Taipei 106, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, 1 Univ Rd, Tainan 70101, Taiwan
关键词
Quantum key distribution; Authentication; Information leakage Intercept-and-measure attack; Synchronization; Quantum fingerprinting;
D O I
10.1007/s11128-017-1566-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Guan et al. (Quantum Inf Process 13(11):2355-2374, 2014) proposed a three-party authenticated quantum key distribution protocol which allows two participants to authenticate each other and eventually share a session key between them with the help of a trusted center (TC), who has pre-shared a master key with each participant, respectively. After a successful authentication and key distribution process, TC and the participants update their master keys, respectively. However, this study points out that Guan et al. 's scheme suffers from the intercept-and-measure attack and information leakage problem, and has the synchronization problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [2] A practical protocol for three-party authenticated quantum key distribution
    D. J. Guan
    Yuan-Jiun Wang
    E. S. Zhuang
    Quantum Information Processing, 2014, 13 : 2355 - 2374
  • [3] A practical protocol for three-party authenticated quantum key distribution
    Guan, D. J.
    Wang, Yuan-Jiun
    Zhuang, E. S.
    QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2355 - 2374
  • [4] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [5] Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
    Kanamori, Yoshito
    Hoanca, Bogdan
    Yoo, Seong-Moo
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [7] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [8] Simple three-party password authenticated key exchange protocol
    Lo N.-W.
    Yeh K.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 600 - 603
  • [9] Simple Three-Party Password Authenticated Key Exchange Protocol
    罗乃维
    叶国晖
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 600 - 603
  • [10] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):