Comment on "A practical protocol for three-party authenticated quantum key distribution"

被引:1
|
作者
Luo, Yi-Ping [1 ]
Chou, Wen-Han [2 ]
Hwang, Tzonelih [2 ]
机构
[1] CyberTrust Technol Inst, Inst Informat Ind, 116 Fu Yang St, Taipei 106, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, 1 Univ Rd, Tainan 70101, Taiwan
关键词
Quantum key distribution; Authentication; Information leakage Intercept-and-measure attack; Synchronization; Quantum fingerprinting;
D O I
10.1007/s11128-017-1566-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Guan et al. (Quantum Inf Process 13(11):2355-2374, 2014) proposed a three-party authenticated quantum key distribution protocol which allows two participants to authenticate each other and eventually share a session key between them with the help of a trusted center (TC), who has pre-shared a master key with each participant, respectively. After a successful authentication and key distribution process, TC and the participants update their master keys, respectively. However, this study points out that Guan et al. 's scheme suffers from the intercept-and-measure attack and information leakage problem, and has the synchronization problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [22] Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
    Liu, I-Cheng
    Hwang, Tzonelih
    Wei, Hsu-Chen
    QUANTUM INFORMATION PROCESSING, 2023, 22 (08)
  • [23] TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
    QIAO, Hui
    DONG, Xuewen
    SHEN, Yulong
    LIU, Haozhe
    YANG, Lingxiao
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 686 - 696
  • [24] Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
    I-Cheng Liu
    Tzonelih Hwang
    Hsu-Chen Wei
    Quantum Information Processing, 22
  • [25] A communication and computation-efficient three-party authenticated key agreement protocol
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 854 - 863
  • [26] TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
    QIAO Hui
    DONG Xuewen
    SHEN Yulong
    LIU Haozhe
    YANG Lingxiao
    Chinese Journal of Electronics, 2021, 30 (04) : 686 - 696
  • [27] Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1329 - 1343
  • [28] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105
  • [29] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [30] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226