Multi-party Quantum Key Agreement Protocol with Authentication
نویسندگان
چکیده
Utilizing the advantage of quantum entanglement swapping, a multi-party key agreement protocol with authentication is proposed. In this protocol, semi-trusted third party introduced, who prepares Bell states, and sends one particle to multiple participants respectively. After that can share Greenberger-Horne-Zeilinger state by swapping. Finally, these measure particles in their hands obtain an key. Here, classical hash function Hadamard operation are utilized authenticate identity participants. The correlations GHZ states ensure security proposed protocol. To illustrated it detailly, against common attacks analyzed, which shows secure theory.
منابع مشابه
Authenticated Multi-Party Key Agreement
We examine multi-party key agreement protocols that provide (i) key authentica-tion, (ii) key connrmation and (iii) forward secrecy. Several minor (repairable) attacks are presented against previous two-party key agreement schemes and a model for key agreement is presented that provably provides the properties listed above. A generalization of the Burmester-Desmedt model (Eurocrypt '94) for mul...
متن کاملIronwood Meta Key Agreement and Authentication Protocol
Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...
متن کاملMulti-party authenticated key agreement protocols from multi-linear forms
Joux [10] presented a one round protocol for tripartitie key agreement and Al-Riyami et.al. [15] developed a number of tripartitie, one round, authenticated protocols related to MTI and MQV protocols. Recently, Boneh and Silverleg [4] studied multilinear forms, which provides a one round multi-party key agreement protocol. In this paper, we propose (n + 1) types of one round authenticated multi...
متن کاملSimulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the s...
متن کاملAn efficient certificateless two-party authenticated key agreement protocol
Due to avoiding the key escrow problem in the identity-based cryptosystem, certificateless public key cryptosystem (CLPKC) has received a significant attention. As an important part of the CLPKC, the certificateless authenticated key agreement (CLAKA) protocol also received considerable attention. Most CLAKA protocols are built from bilinear mappings on elliptic curves which need costly operati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Theoretical Physics
سال: 2021
ISSN: ['0020-7748', '1572-9575']
DOI: https://doi.org/10.1007/s10773-021-04954-2