Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack
نویسندگان
چکیده
In 2021, Chang et al. proposed an authenticated semi-quantum key-distribution (ASQKD) protocol using single photons and channel. However, eavesdropper can launch a reflective attack to forge the receiver’s identity without being detected. addition, al.’s ASQKD assumes classical channel between sender receiver. It is considered illogical have in protocol. If these security issues are not addressed, will fail deliver secret key. Therefore, this study proposes efficient secure circumvent problems only photons. Security analysis proves that effectively avoid reflecting attacks, collective other typical attacks. Compared with existing protocols, has following advantages: based on photon, it demands less advanced quantum devices, communication efficiency higher than most reduces length of required pre-shared keys, endures there no need for
منابع مشابه
Authenticated Key Exchange Protocol Secure against Offline Dictionary Attack and Server Compromise
This paper introduces a new scheme, called Augmented Password AKE (APAKE), for authenticated key exchange protocols. In APAKE, a password is represented by a pair of values that is randomly selected in a huge space. We present an APAKE protocol. The protocol is secure against the attacks including off-line dictionary attack and server compromise allowing for subsequent off-line dictionary attac...
متن کاملSecure Authenticated Key Exchange Protocol
From Seo and Sweeney proposed SAKA (Simple Authenticated Key agreement Algorithm), many SAKA variants were proposed to cope with the weaknesses in SAKA. However, they still are vulnerable to off-line password guessing attack. This paper proposes a new secure authenticated key exchange protocol that can resist off-line password guessing attack. To solve the vulnerability of former protocols, key...
متن کاملQuantum Authenticated Key Distribution
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...
متن کاملProvably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack
By using Password-based Authenticated Key Exchange (PAKE), a server can authenticate a user who has only the same password shared with the server in advance and establish a session key with the user simultaneously. However, in the real applications, we may have a situation where a user needs to share a session key with server A, but the authentication needs to be done by a different server B th...
متن کاملQuantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack
Despite the unconditionally secure theory of the Quantum Key Distribution (QKD), several attacks have been successfully implemented against commercial QKD systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10081241