首页 | 官方网站   微博 | 高级检索  
     

基于量子不经意密钥传输的量子匿名认证密钥交换协议
引用本文:魏春艳,蔡晓秋,王天银,苏琦,秦素娟,高飞,温巧燕.基于量子不经意密钥传输的量子匿名认证密钥交换协议[J].电子与信息学报,2020,42(2):341-347.
作者姓名:魏春艳  蔡晓秋  王天银  苏琦  秦素娟  高飞  温巧燕
作者单位:1.北京邮电大学网络与交换技术国家重点实验室 北京 1008762.洛阳师范学院数学科学学院 洛阳 4719343.鹏程实验室量子计算研究中心 深圳 5180554.密码科学技术国家重点实验室 北京 100878
基金项目:国家自然科学基金(61672110, 61671082, 61902166, 61572246, 61602232, 61602045),河南省科技攻关计划项目(182102310930),河南省高校科技创新研究团队基金(18IRTSTHN014)
摘    要:鉴于量子密码在密钥分配方面取得的巨大成功,人们也在尝试利用量子性质来设计其他各类密码协议。匿名认证密钥交换就是一类尚缺乏实用化量子实现途径的密码任务。为此,该文提出一个基于量子不经意密钥传输的量子匿名认证密钥交换协议。它在满足用户匿名性和实现用户与服务器双向认证的前提下,为双方建立了一个安全的会话密钥。该协议的安全性基于量子力学原理,可以对抗量子计算的攻击。此外,该协议中服务器的攻击行为要么无法奏效,要么能够与外部窃听区分开(从而被认定为欺骗),因此服务器通常不敢冒着名誉受损的风险来实施欺骗。

关 键 词:量子保密查询    不经意传输    量子匿名认证密钥交换
收稿时间:2019-09-04

Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer
Chunyan WEI,Xiaoqiu CAI,Tianyin WANG,Qi SU,Sujuan QIN,Fei GAO,Qiaoyan WEN.Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer[J].Journal of Electronics & Information Technology,2020,42(2):341-347.
Authors:Chunyan WEI  Xiaoqiu CAI  Tianyin WANG  Qi SU  Sujuan QIN  Fei GAO  Qiaoyan WEN
Affiliation:1.State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China2.School of Mathematical Science, Luoyang Normal University, Luoyang 471934, China3.Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen 518055, China4.State Key Laboratory of Cryptology, Beijing 100878, China
Abstract:In view of the great success of quantum cryptography in key distribution, people also try to utilize the quantum mechanics to construct many other cryptographic protocols. Anonymous authenticated key exchange is exactly one kind of cryptographic tasks whose practical quantum solution is still awaited so far. To solve this problem, a quantum anonymous authenticated exchange protocol is proposed based on a quantum oblivious key transfer scheme. It not only realizes user anonymity and mutual authentication of the user and server, but also establishes a secure session key between the two parties. Besides, the attacks of the server either fail or can be discriminated with outside eavesdropping (the server is thus caught as a cheater), so the server generally will not cheat at the risk of gaining a bad reputation.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号