期刊文献+

一种无证书的跨域量子密钥协商协议 被引量:1

A certificateless cross-domain quantum key agreement protocol
下载PDF
导出
摘要 针对传统跨域密钥协商协议安全性不足问题,提出一种新的跨域量子密钥协商协议。在无证书密钥协商体系下,采用量子密钥协商与经典密码算法结合的方案,提高了协议适应现有通信网络架构的能力。密钥协商过程使用三粒子量子隐形传态,利用量子态不可克隆定理保障协商过程中密钥的安全性。与其他方案相比,本协议具有较高的量子比特效率,并且可以抵抗中间人攻击、重放攻击等多种内部和外部攻击手段。 Aiming at the problem of insufficient security of traditional cross-domain key agreement protocol,a new cross-domain quantum key agreement protocol is proposed.In the certificateless key negotiation system,the combination of quantum key negotiation and classical cryptographic algorithm is adopted to improve the ability of the protocol to adapt to the existing communication network architecture.The key negotiation process uses three-particle quantum teleportation,and the quantum state non-cloning theorem can guarantee the security of the key during the negotiation process.Compared with other schemes,the proposed protocol has higher quantum bit efficiency and can resist various internal and external attacks such as man-in-the-middle attacks and replay attacks.
作者 马骁 施运梅 宋莹 孟坤 MA Xiao;SHI Yunmei;SONG Ying;MENG Kun(School of Computer,Beijing Information Science and Technology University,Beijing 100101,China)
出处 《太赫兹科学与电子信息学报》 北大核心 2020年第6期1098-1102,共5页 Journal of Terahertz Science and Electronic Information Technology
基金 国家重点研发计划:私有云环境下服务化智能办公系统平台(2018YFB1004100) 中央引导地方专项“量子通信技术创新与行业应用”(Z171100004717002)。
关键词 量子密钥协商 量子隐形传态 共享密钥 无证书 quantum key agreement quantum teleportation shared key certificateless
  • 相关文献

参考文献7

二级参考文献38

  • 1苏晓琴,郭光灿.量子通信与量子计算[J].量子电子学报,2004,21(6):706-718. 被引量:63
  • 2路洪,陈立冰,黄纯青,谭鹏.用W态作量子信道实现纠缠态的隐形传送[J].量子电子学报,2004,21(6):730-733. 被引量:12
  • 3杨宇光,温巧燕,朱甫臣.基于纠缠交换的多方多级量子密钥分配协议[J].物理学报,2005,54(12):5544-5548. 被引量:11
  • 4SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 5Diffie W, Hellman M. New directions in cryptography [ J ]. IEEE Transactions on Information Theory, 1976, 22 (6) :644 - 654.
  • 6Shamir A. Identity-based eryptosystems and signature schemes[ C ]// Advances in Cryptology CRYPTO 84, LNCS 196. Berlin: Springer- Verlag, 1984:47-53.
  • 7AL-Riyami S S, Paterson K G. Certificateless public key cryptogra- phy [ C ] ///Asiacrypt 03, LNCS 2894. Berlin : Springer-Verlag, 2003 : 452 -473.
  • 8Swanson C, David J. A study of two-party certificateless authentica- ted key-agreement protocols [ C ] //Proceedings of INDOCRYPT 2009. LNCS 5922. Berlin : Springer-Verlag, 2009:57 - 71.
  • 9Lippold G, Boyd C, Nieto J. Strongly secure certifieateless key agreement[ C]//Proceeding of the Pairing 2009. LNCS 5671. Ber- lin, Heidelberg: Spfinger-Verlag, 2009:206-230.
  • 10Mandt T, Tan C. Certifieateless authenticated two-party key agree- ment protocols [ C ] // Proceedings of the ASIAN 2006. LNCS,4435. Springer-Verlag, 2008:37 -44.

共引文献51

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部