Comment on "A practical protocol for three-party authenticated quantum key distribution"

被引:1
|
作者
Luo, Yi-Ping [1 ]
Chou, Wen-Han [2 ]
Hwang, Tzonelih [2 ]
机构
[1] CyberTrust Technol Inst, Inst Informat Ind, 116 Fu Yang St, Taipei 106, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, 1 Univ Rd, Tainan 70101, Taiwan
关键词
Quantum key distribution; Authentication; Information leakage Intercept-and-measure attack; Synchronization; Quantum fingerprinting;
D O I
10.1007/s11128-017-1566-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Guan et al. (Quantum Inf Process 13(11):2355-2374, 2014) proposed a three-party authenticated quantum key distribution protocol which allows two participants to authenticate each other and eventually share a session key between them with the help of a trusted center (TC), who has pre-shared a master key with each participant, respectively. After a successful authentication and key distribution process, TC and the participants update their master keys, respectively. However, this study points out that Guan et al. 's scheme suffers from the intercept-and-measure attack and information leakage problem, and has the synchronization problem.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Three-Party Semi-Quantum Key Agreement Protocol
    Zhou, Nan-Run
    Zhu, Kong-Ni
    Wang, Yun-Qian
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (03) : 663 - 676
  • [42] Three-Party Semi-Quantum Key Agreement Protocol
    Nan-Run Zhou
    Kong-Ni Zhu
    Yun-Qian Wang
    International Journal of Theoretical Physics, 2020, 59 : 663 - 676
  • [43] A round- and computation-efficient three-party authenticated key exchange protocol
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (09) : 1581 - 1590
  • [44] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [45] Three-party authenticated key agreements for optimal communicatione
    Lee, Tian-Fu
    Hwang, Tzonelih
    PLOS ONE, 2017, 12 (03):
  • [46] A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (04): : 404 - 409
  • [47] Privacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards
    Park, Suyeon
    Park, Hee-Joo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 307 - 320
  • [48] Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    Wu, Shuhua
    Pu, Qiong
    Wang, Shengbao
    He, Debiao
    INFORMATION SCIENCES, 2012, 215 : 83 - 96
  • [49] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [50] Provably secure three-party password authenticated key exchange protocol in the standard model
    Yang, Jun-Han
    Cao, Tian-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 340 - 350