期刊文献+

Secure authentication of classical messages with single photons

Secure authentication of classical messages with single photons
下载PDF
导出
摘要 This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3189-3192,共4页 中国物理B(英文版)
基金 supported by the National Natural Science Foundation of China (Grant Nos 60873191 and 60821001) the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No 200800131016) Beijing Nova Program (Grant No2008B51) Key Project of the Chinese Ministry of Education (Grant No 109014) the Natural Science Foundation of Beijing (Grant No 4072020) the National Laboratory for Modern Communications Science Foundation of China (Grant No 9140C1101010601) the Natural Science Foundation of Education Bureau of Henan Province (Grant No 2008B120005) the Youth Foundation of Luoyang Normal University
关键词 message authentication codes single photons hash function message authentication codes, single photons, hash function
  • 相关文献

参考文献25

  • 1Diffie W and Hellman M 1976 IEEE Transactions on Information Theory 22 644.
  • 2Wegman M N and Carter J L 1981 J. Computer and System Sciences 22 265.
  • 3Yang B, Karri R and McGrew D 2006 IEEE J. Selected Areas in Communication 24 1831.
  • 4Rivest R, Shamir A, and Adleman L 1978 Communications of the ACM 21 120.
  • 5E1Gamal T 1985 IEEE Transactions on Information Theory 31 469.
  • 6Shor P 1997 SIAM J. Computing 26 1484.
  • 7Bennett C H and Brassard G 1984 Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York) 173.
  • 8Ekert A K 1991 Phys. Rev. Lett. 67 661.
  • 9Bennett C H 1992 Phys. Rev. Lett. 68 3121.
  • 10Yang L, Wu L A and Liu S H 2002 Acta Phys. Sin. 51 2446.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部