浏览全部资源
扫码关注微信
1. 西北工业大学电子信息学院,陕西 西安710072
2. 西安建筑科技大学信息与控制工程学院,陕西 西安710055
[ "董颖娣(1978-),女,陕西西安人,西北工业大学博士生,主要研究方向为量子密码通信。" ]
[ "彭进业(1964-),男,湖南娄底人,西北工业大学教授,主要研究方向为量子密码通信及图像处理等。" ]
[ "张晓博(1975-),男,陕西西安人,西北工业大学博士生,主要研究方向为模式识别与量子通信。" ]
[ "张振龙(1980-),男,陕西韩城人,西安建筑科技大学博士生,主要研究方向为数字图像处理。" ]
网络出版日期:2016-02,
纸质出版日期:2016-02-15
移动端阅览
董颖娣, 彭进业, 张晓博, 等. 基于测量设备无关协议的量子身份认证方案[J]. 通信学报, 2016,37(2):152-157.
Ying-di DONG, Jin-ye PENG, Xiao-bo ZHANG, et al. Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol[J]. Journal on communications, 2016, 37(2): 152-157.
董颖娣, 彭进业, 张晓博, 等. 基于测量设备无关协议的量子身份认证方案[J]. 通信学报, 2016,37(2):152-157. DOI: 10.11959/j.issn.1000-436x.2016041.
Ying-di DONG, Jin-ye PENG, Xiao-bo ZHANG, et al. Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol[J]. Journal on communications, 2016, 37(2): 152-157. DOI: 10.11959/j.issn.1000-436x.2016041.
借助测量设备无关量子密钥分配协议的安全性,提出了测量设备无关的量子身份认证协议。在此协议下,认证中心和认证方以共享密钥加密认证信息和认证密钥,将其发送至第三方进行贝尔态测量以提取安全的认证信息,实现认证中心对认证方有效认证,并更新共享密钥。分析协议性能显示,系统在不同攻击下认证过程是安全且有效的。
Utilized to security properties of measurement-device-independent quantum key distribution (MDI-QKD)protocol
quantum identity authentication scheme based on MDI (QIA-MDI)protocol was presented. In this protocol
authentication center (AC)and authentication user have encrypted authentication information and next authenticated key by shared key
and then they transmitted the encrypted information to untrusted third party for Bell-state measurement (BSM). The secret authentication information was obtained through the BSM result
which can verify the communicator identity and update shared key. The security performance of the proposed scheme is extensively analyzed and accordingly con?rmed in the case of attacks.
SHOR P W , PRESKILL J . Simple proof of security of the BB84 quantum key distribution protocol [J ] . Phys Rev Lett , 2000 , 85 : 441 - 446 .
GOTTESMAN D , LO H K , LUTKENHAUS N , et al . Security of quantum key distribution with imperfect devices [J ] . Quantum Infor Comput , 2004 , 4 : 325 - 329 .
PAUL J , DAVID E , SÉBASTIEN K J . High bit rate continuous-variable quantum key distribution [J ] . Phys Rev A , 2014 , 90 ( 4 ): 042329 - 042335 .
ZHOU R R , YANG L . Quantum election scheme based on anonymous quantum key distribution [J ] . Chin Phys B , 2012 , 21 ( 8 ): 080301080309 .
ALEXANDER S , ZUREK W H . Quantum discord cannot be shared [J ] . Phys Rev Let , 2013 , 111 ( 4 ): 040401 - 040406 .
曾贵华 . 量子保密通信 [M ] . 北京 : 高等教育出版社 , 2006 .
ZENG G H . Quantum private communication [M ] . Beijing : Higher Educaiton Press , 2006 .
DUSEK M , HANDERKA O , HENDRYCH M . Quantum identification system [J ] . Phys Rev A , 1999 , 60 ( 1 ): 149 - 156 .
ZENG G H , ZHANG W P . Identity verification in quantum distri-bution [J ] . Phys Rev A , 2000 , 61 : 022303 - 022308 .
曾贵华 . 不依赖于第三方的动态量子身份认证方案 [J ] . 电子学报 , 2004 , 32 ( 7 ): 1148 - 1152 .
ZENG G H . Quantum identity authentication without trusted-party [J ] . Acta Electronica Sinca , 2004 , 32 ( 7 ): 1148 - 1152 .
ZHOU N R , ZENG G H , ZENG W J , et al . Cross-center quantum identification based on teleportation and entanglement swapping [J ] . Optics Communications , 2005 , 254 : 380 - 388 .
杨宇光 , 温巧燕 , 朱甫臣 . 一种网络多用户量子认证和量子身份认证方案 [J ] . 物理学报 , 2005 , 54 ( 9 ): 3995 - 4000 .
YANG Y G , WEN Q Y , ZHU F C . A theoretical scheme for m lti-user quantum authentication and key distribution in a network [J ] . Acta Physica Sinca , 2005 , 54 ( 9 ): 3995 - 4000 .
ZHANG Z S , ZENG G H , ZHOU N R , et al . Quantum identity authentication based on ping-pong technique for photons [J ] . Phys Let A , 2006 , 356 : 199 - 205 .
张兴兰 . 基于公钥的单向量子身份认证 [J ] . 科学通报 , 2009 , 59 ( 10 ): 1415 - 1418 .
ZHANG X L . One-way quantum identity authentication based on pub-lic key [J ] . Chinese Sci Bull , 2009 , 54 ( 10 ): 1415 - 1418 .
李渊华 , 刘俊昌 , 义友 . 基于纠缠交换和团簇态实现二粒子任意态的可控隐形传态 [J ] . 光子学报 , 2010 , 39 ( 11 ): 1615 - 1616 .
LI Y H , LIU J C , NIE Y Y . Controlled teleportation of an arbitrary two-particle state by using a four-qubit cluster state and entanglement swapping [J ] . Acta Photonica Sinca , 2010 , 39 ( 11 ): 1615 - 1616 .
YANG Y G , WANG H Y , JIA X . A quantum protocol for (t, n)-threshold identity authentication based on greenberg-er-horne-zeilinger states [J ] . Theor Phys , 2013 , 52 : 524 - 530 .
HUANG P , ZHU J , LU Y , et al . Quantum identity authentication using gaussian-modulation squeezed state [J ] . International Journal of Quantum Information , 2011 , 9 ( 2 ): 701 - 721 .
YANG Y G , TIAN J , XIA J . Quantum authenticated direct communication using bell states [J ] . Theor Phys , 2013 , 52 : 336 - 344 .
MAKAROV V , SKAAR J . Hacking commercial quantum cryptography systems by tailored bright illumination [J ] . Nature Photonics , 2010 , 214 ( 4 ): 686 - 689 .
ZHAO Y , FUNG C H F , QI B . Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key- distribution systems [J ] . Phys Rev A , 2008 , 78 : 042333 - 042340 .
LO H K , CURTY M , QI B . Measurement-device-independent quantum key distribution [J ] . Phys Rev Let , 2012 , 108 : 130508 - 13514 .
TANG Z Y , LIAO Z F , XU F H , et al . Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution [J ] . Phys. Rev. Let , 2014 , 112 ( 19 ): 190503 - 190511 .
马瑞霖 . 量子密码通信 [M ] . 北京 : 科学出版社 , 2006 .
MA R L . Quantum cryptograghy communication [M ] . Beijing : Science Press , 2006 .
GARCIA-PATRON R , CERF N J . Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution [J ] . Physical Review Letters , 2006 , 97 : 190503 - 190510 .
YANG C W , TSAI C W , HWANG T . Fault tolerant two-step quantum secure direct communication protocol against collective noises [J ] . Sci. China G:Phys. Mech. Astron , 2011 , 54 ( 3 ): 496 - 501 .
0
浏览量
756
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构