Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.2.73

Quantum Authentication and Key Distribution protocol based on one-time ID  

Lee Hwa-Yean (Graduate School of Information Security (GSIS) , Korea University)
Hong Chang-Ho (Graduate School of Information Security (GSIS) , Korea University)
Lim Jong-in (Graduate School of Information Security (GSIS) , Korea University)
Yang Hyung-Jin (Department of Physics, Korea University)
Abstract
We propose a Quantum Authentication and Key distribution protocol based on one-time n using one-way Hash function. The designated users can authenticate each other and the arbitrator using their one-time ID and distribute a quantum secret key using remained GHZ states after authentication procedure. Though the help of the arbitrator is needed in the process of authentication and key distribution, our protocol prevents the arbitrator from finding out the shared secret key even if the arbitrator becomes an active attacker. Unconditional security can be proved in our protocol as the other QKD protocols.
Keywords
Quantum Cryptography; Quantum authentication; Quantum key distribution;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Daniel Ljunggren, Mohamed Bourennane, and Anders Karlsson, 'Authority-based user authentication in quantum key distribution', PHYSICAL REVIEW A, VOLUME 62, 022305 (2000)
2 M. Murao, M. B. Plenio, S. Popescu, V. Vedral, and P. L. Knight, 'Multipartite entanglement purification protocols', Phys. Rev. 57, R4075 (1998)   DOI
3 Guihua Zeng and Weiping Zhang, 'Identity verification in quantum key distribution', PHYSICAL REVIEW A, VOLUME 61, 022303 (2000)
4 Ping-Xing Chen and Cheng-Zu Li, 'Distilling multipartite pure state from a finite number of copies of multipartite mixed states', Phys. Rev. A 69, 012308 (2004)
5 Hoi-Kwong Lo and H.F.Chau, 'Unconditional security of Quantum key distribution over arbitrarily long distances', science vol 283 pp2050-2056(1999)   DOI   PUBMED   ScienceOn
6 Dominic Mayers, 'Unconditional security in Quantum Cryptography', ArXiv:quant-ph/9802025 (1998)
7 Bao-Sen Shi, Jian Li, Jin-Ming Liu, Xiao-Feng Fan, Guang-Can Guo, 'Quantum key distribution and quantum authentication based on entangled state ', Physics Letters A 281, 83-87 (2001)   DOI   ScienceOn
8 iloslav Dusek, Ondrj Haderka, Martin Hendrych, and Robert Myska, 'Quantum Iidentification system', Phys. Rev. A 60, 149-156 (1999)   DOI
9 Takashi Mihara, 'Quantum identification schemes with entanglements', Phys. Rev. A 65, 052326 (2002)
10 Artur K. Ekert, 'Quantum crypto- graphy based on Bell' s theorem', Phys. Rev. Lett. 67, 661 (1991)
11 A. Ambainis, A.Smith, and Ke Yang, 'Extracting Quantum Entanglement (General Entanglement Purification Protocols)', 17th Annual IEEE con- ference on Computational Complexity (CCC2002) p103
12 이화연, 홍창호, 이덕진, 양형진, 임종인, '인증된 양자 키 분배 프로토콜', 정보보호학회논문지 제 14권, 제 2호 pp49-55 (2004)
13 Peter W. Shor, John Preskill, 'Simple proof of security of the BB84 quantum key distribution protocol', Phys. Rev. Lett. 85, 441-444 (2000)   DOI   ScienceOn
14 C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE, New York , 1984), p. 175
15 Charles H. Bennett, 'Quantum Cryptography Using Any Two Nonorthogonal States', Phys. Rev. Lett. 68, 3121 (1991)