Multi-party Quantum Key Agreement Protocol with Authentication

نویسندگان

چکیده

Utilizing the advantage of quantum entanglement swapping, a multi-party key agreement protocol with authentication is proposed. In this protocol, semi-trusted third party introduced, who prepares Bell states, and sends one particle to multiple participants respectively. After that can share Greenberger-Horne-Zeilinger state by swapping. Finally, these measure particles in their hands obtain an key. Here, classical hash function Hadamard operation are utilized authenticate identity participants. The correlations GHZ states ensure security proposed protocol. To illustrated it detailly, against common attacks analyzed, which shows secure theory.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticated Multi-Party Key Agreement

We examine multi-party key agreement protocols that provide (i) key authentica-tion, (ii) key connrmation and (iii) forward secrecy. Several minor (repairable) attacks are presented against previous two-party key agreement schemes and a model for key agreement is presented that provably provides the properties listed above. A generalization of the Burmester-Desmedt model (Eurocrypt '94) for mul...

متن کامل

Ironwood Meta Key Agreement and Authentication Protocol

Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...

متن کامل

Multi-party authenticated key agreement protocols from multi-linear forms

Joux [10] presented a one round protocol for tripartitie key agreement and Al-Riyami et.al. [15] developed a number of tripartitie, one round, authenticated protocols related to MTI and MQV protocols. Recently, Boneh and Silverleg [4] studied multilinear forms, which provides a one round multi-party key agreement protocol. In this paper, we propose (n + 1) types of one round authenticated multi...

متن کامل

Simulatable certificateless two-party authenticated key agreement protocol

Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...

متن کامل

An efficient certificateless two-party authenticated key agreement protocol

Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the certificateless authenticated key agreement (CLAKA) protocol also received considerable attention. Most CLAKA protocols are built from bilinear mappings on elliptic curves which need costly operati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Theoretical Physics

سال: 2021

ISSN: ['0020-7748', '1572-9575']

DOI: https://doi.org/10.1007/s10773-021-04954-2