一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于量子不經(jīng)意密鑰傳輸?shù)牧孔幽涿J(rèn)證密鑰交換協(xié)議

魏春艷 蔡曉秋 王天銀 蘇琦 秦素娟 高飛 溫巧燕

魏春艷, 蔡曉秋, 王天銀, 蘇琦, 秦素娟, 高飛, 溫巧燕. 基于量子不經(jīng)意密鑰傳輸?shù)牧孔幽涿J(rèn)證密鑰交換協(xié)議[J]. 電子與信息學(xué)報(bào), 2020, 42(2): 341-347. doi: 10.11999/JEIT190679
引用本文: 魏春艷, 蔡曉秋, 王天銀, 蘇琦, 秦素娟, 高飛, 溫巧燕. 基于量子不經(jīng)意密鑰傳輸?shù)牧孔幽涿J(rèn)證密鑰交換協(xié)議[J]. 電子與信息學(xué)報(bào), 2020, 42(2): 341-347. doi: 10.11999/JEIT190679
Chunyan WEI, Xiaoqiu CAI, Tianyin WANG, Qi SU, Sujuan QIN, Fei GAO, Qiaoyan WEN. Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer[J]. Journal of Electronics & Information Technology, 2020, 42(2): 341-347. doi: 10.11999/JEIT190679
Citation: Chunyan WEI, Xiaoqiu CAI, Tianyin WANG, Qi SU, Sujuan QIN, Fei GAO, Qiaoyan WEN. Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer[J]. Journal of Electronics & Information Technology, 2020, 42(2): 341-347. doi: 10.11999/JEIT190679

基于量子不經(jīng)意密鑰傳輸?shù)牧孔幽涿J(rèn)證密鑰交換協(xié)議

doi: 10.11999/JEIT190679
基金項(xiàng)目: 國家自然科學(xué)基金(61672110, 61671082, 61902166, 61572246, 61602232, 61602045),河南省科技攻關(guān)計(jì)劃項(xiàng)目(182102310930),河南省高校科技創(chuàng)新研究團(tuán)隊(duì)基金(18IRTSTHN014)
詳細(xì)信息
    作者簡介:

    魏春艷:女,1982年生,副教授,研究方向?yàn)榱孔用艽a與量子信息

    蔡曉秋:女,1980年生,副教授,研究方向?yàn)榱孔用艽a與量子計(jì)算

    王天銀:男,1979年生,教授,研究方向?yàn)榱孔用艽a與量子信息

    蘇琦:男,1985年生,副研究員,研究方向?yàn)榱孔用艽a與量子計(jì)算

    秦素娟:女,1979年生,副教授,研究方向?yàn)榱孔用艽a與量子計(jì)算

    高飛:男,1980年生,教授,研究方向?yàn)榱孔用艽a與量子計(jì)算

    溫巧燕:女,1959年生,教授,研究方向?yàn)槊艽a學(xué)與信息安全

    通訊作者:

    高飛 gaofei_bupt@hotmail.com

  • 中圖分類號(hào): TN918

Quantum Anonymous Authenticated Key Exchange Protocol Based on Quantum Oblivious Key Transfer

Funds: The National Natural Science Foundation of China (61672110, 61671082, 61902166, 61572246, 61602232, 61602045), The Key Scientific and Technological Research Project of Henan Province (182102310930), The Program for Science & Technology Innovation Research Team in Universities of Henan Province (18IRTSTHN014)
  • 摘要: 鑒于量子密碼在密鑰分配方面取得的巨大成功,人們也在嘗試?yán)昧孔有再|(zhì)來設(shè)計(jì)其他各類密碼協(xié)議。匿名認(rèn)證密鑰交換就是一類尚缺乏實(shí)用化量子實(shí)現(xiàn)途徑的密碼任務(wù)。為此,該文提出一個(gè)基于量子不經(jīng)意密鑰傳輸?shù)牧孔幽涿J(rèn)證密鑰交換協(xié)議。它在滿足用戶匿名性和實(shí)現(xiàn)用戶與服務(wù)器雙向認(rèn)證的前提下,為雙方建立了一個(gè)安全的會(huì)話密鑰。該協(xié)議的安全性基于量子力學(xué)原理,可以對抗量子計(jì)算的攻擊。此外,該協(xié)議中服務(wù)器的攻擊行為要么無法奏效,要么能夠與外部竊聽區(qū)分開(從而被認(rèn)定為欺騙),因此服務(wù)器通常不敢冒著名譽(yù)受損的風(fēng)險(xiǎn)來實(shí)施欺騙。
  • 圖  1  Liu等人的不經(jīng)意密鑰傳輸協(xié)議

  • VIET D Q, YAMAMURA A, and TANAKA H. Anonymous password-based authenticated key exchange[C]. The 6th International Conference on Cryptology in India, Bangalore, India, 2005: 244–257. doi: 10.1007/11596219_20.
    HU Xuexian, ZHANG Jiang, ZHANG Zhenfeng, et al. Universally composable anonymous password authenticated key exchange[J]. Science China Information Sciences, 2017, 60(5): 52107. doi: 10.1007/s11432-016-5522-z
    LI Xiong, IBRAHIM M H, KUMARI S, et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks[J]. Computer Networks, 2017, 129: 429–443. doi: 10.1016/j.comnet.2017.03.013
    SHOR P W. Algorithms for quantum computation: Discrete logarithms and factoring[C]. The 35th Annual Symposium on Foundations of Computer Science, Santa Fe, USA, 1994: 124–134. doi: 10.1109/SFCS.1994.365700.
    GROVER L K. A fast quantum mechanical algorithm for database search[C]. The 28th Annual ACM Symposium on Theory of Computing, Philadelphia, USA, 1996: 212–219. doi: 10.1145/237814.237866.
    GISIN N, RIBORDY G, TITTEL W, et al. Quantum cryptography[J]. Reviews of Modern Physics, 2002, 74(1): 145–195. doi: 10.1103/RevModPhys.74.145
    EVEN S, GOLDREICH O, and LEMPEL A. A randomized protocol for signing contracts[J]. Communications of the ACM, 1985, 28(6): 637–647. doi: 10.1145/3812.3818
    BRASSARD G, CREPEAU C, and ROBERT J M. All-or-Nothing Disclosure of Secrets[M]. Berlin, Heidelberg: Springer, 1987: 234–238. doi: 10.1007/3-540-47721-7_17.
    GAO Fei, QIN Sujuan, HUANG Wei, et al. Quantum private query: A new kind of practical quantum cryptographic protocol[J]. Science China Physics, Mechanics & Astronomy, 2019, 62(7): 70301. doi: 10.1007/s11433-018-9324-6
    JAKOBI M, SIMON C, GISIN N, et al. Practical private database queries based on a quantum- key-distribution protocol[J]. Physical Review A, 2011, 83(2): 022301. doi: 10.1103/PhysRevA.83.022301
    SCARANI V, ACíN A, RIBORDY G, et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations[J]. Physical Review Letters, 2004, 92(5): 057901. doi: 10.1103/physrevlett.92.057901
    GAO Fei, LIU Bin, WEN Qiaoyan, et al. Flexible quantum private queries based on quantum key distribution[J]. Optics Express, 2012, 20(16): 17411–17420. doi: 10.1364/OE.20.017411
    ZHANG Jiali, GUO Fenzhuo, GAO Fei, et al. Private database queries based on counterfactual quantum key distribution[J]. Physical Review A, 2013, 88(2): 022334. doi: 10.1103/physreva.88.022334
    SASAKI T, YAMAMOTO Y, and KOASHI M. Practical quantum key distribution protocol without monitoring signal disturbance[J]. Nature, 2014, 509(7501): 475–478. doi: 10.1038/nature13303
    LIU Bin, GAO Fei, HUANG Wei, et al. QKD-based quantum private query without a failure probability[J]. Science China Physics, Mechanics & Astronomy, 2015, 58(10): 100301. doi: 10.1007/s11433-015-5714-3
    WEI Chunyan, GAO Fei, WEN Qiaoyan, et al. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key -distribution protocol[J]. Scientific Reports, 2014, 4(1): 7537. doi: 10.1038/srep07537
    PANDURANGA RAO M V and JAKOBI M. Towards communication-efficient quantum oblivious key distribution[J]. Physical Review A, 2013, 87(1): 012331. doi: 10.1103/PhysRevA.87.012331
    GAO Fei, LIU Bin, HUANG Wei, et al. Postprocessing of the oblivious key in quantum private query[J]. IEEE Journal of Selected Topics in Quantum Electronics, 2015, 21(3): 98–108. doi: 10.1109/jstqe.2014.2358192
    WEI Chunyan, WANG Tianyin, and GAO Fei. Practical quantum private query with better performance in resisting joint-measurement attack[J]. Physical Review A, 2016, 93(4): 042318. doi: 10.1103/PhysRevA.93.042318
    YU Fang, QIU Daowen, SITU Haozhen, et al. Enhancing user privacy in SARG04-based private database query protocols[J]. Quantum Information Processing, 2015, 14(11): 4201–4210. doi: 10.1007/s11128-015-1091-0
    WEI Chunyan, CAI Xiaoqiu, LIU Bin, et al. A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure[J]. IEEE Transactions on Computers, 2018, 67(1): 2–8. doi: 10.1109/TC.2017.2721404
    CHAN P, LUCIO-MARTINEZ I, MO Xiaofan, et al. Performing private database queries in a real-world environment using a quantum protocol[J]. Scientific Reports, 2014, 4(1): 5233. doi: 10.1038/srep05233
    YAO A C C. How to generate and exchange secrets[C]. The 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 1986: 162–167. doi: 10.1109/SFCS.1986.25.
    KILIAN J. Founding crytpography on oblivious transfer[C]. The 20th Annual ACM Symposium on Theory of Computing, Chicago, USA, 1988: 20–31. doi: 10.1145/62212.62215.
    NIELSEN J B, NORDHOLT P S, ORLANDI C, et al. A new approach to practical active-secure two-party computation[C]. The 32nd Annual Cryptology Conference, Santa Barbara, USA, 2012: 681–700. doi: 10.1007/978-3-642-32009-5_40.
    LO H K. Insecurity of quantum secure computations[J]. Physical Review A, 1998, 56(2): 1154–1162. doi: 10.1103/PhysRevA.56.1154
    BENNETT C H and BRASSARD G. Quantum cryptography: Public key distribution and coin tossing[J]. Theoretical Computer Science, 2014, 560: 7–11. doi: 10.1016/j.tcs.2014.05.025
  • 加載中
圖(1)
計(jì)量
  • 文章訪問數(shù):  2813
  • HTML全文瀏覽量:  1025
  • PDF下載量:  121
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2019-09-04
  • 修回日期:  2019-11-12
  • 網(wǎng)絡(luò)出版日期:  2019-11-28
  • 刊出日期:  2020-02-19

目錄

    /

    返回文章
    返回