Comment on "A practical protocol for three-party authenticated quantum key distribution"

被引:1
|
作者
Luo, Yi-Ping [1 ]
Chou, Wen-Han [2 ]
Hwang, Tzonelih [2 ]
机构
[1] CyberTrust Technol Inst, Inst Informat Ind, 116 Fu Yang St, Taipei 106, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, 1 Univ Rd, Tainan 70101, Taiwan
关键词
Quantum key distribution; Authentication; Information leakage Intercept-and-measure attack; Synchronization; Quantum fingerprinting;
D O I
10.1007/s11128-017-1566-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Guan et al. (Quantum Inf Process 13(11):2355-2374, 2014) proposed a three-party authenticated quantum key distribution protocol which allows two participants to authenticate each other and eventually share a session key between them with the help of a trusted center (TC), who has pre-shared a master key with each participant, respectively. After a successful authentication and key distribution process, TC and the participants update their master keys, respectively. However, this study points out that Guan et al. 's scheme suffers from the intercept-and-measure attack and information leakage problem, and has the synchronization problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A practical three-party key exchange protocol with round efficiency
    Chang, Ya-Fen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (04): : 953 - 960
  • [32] Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices
    Rewal, Purva
    Singh, Mrityunjay
    Mishra, Dheerendra
    Pursharthi, Komal
    Mishra, Ankita
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [33] Strongly password-based three-party authenticated key exchange protocol
    Lin, Yuanhui
    Hou, Mengbo
    Xu, Qiuliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 555 - 558
  • [34] Efficient three-party password-based authenticated key exchange protocol
    Xu, C.-X., 1600, Univ. of Electronic Science and Technology of China (41):
  • [35] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355
  • [36] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [37] Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting
    Liu, Ying
    Wei, Fushan
    Ma, Chuangui
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 255 - 267
  • [38] The Three-party Quantum Key Agreement Protocol with Quantum Fourier Transform
    Wei Wang
    Bao-Min Zhou
    Long Zhang
    International Journal of Theoretical Physics, 2020, 59 : 1944 - 1955
  • [39] The Three-party Quantum Key Agreement Protocol with Quantum Fourier Transform
    Wang, Wei
    Zhou, Bao-Min
    Zhang, Long
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (06) : 1944 - 1955
  • [40] An novel three-party authenticated key exchange protocol using one-time key
    Lv, Chao
    Ma, Maode
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 498 - 503