Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack

نویسندگان

چکیده

In 2021, Chang et al. proposed an authenticated semi-quantum key-distribution (ASQKD) protocol using single photons and channel. However, eavesdropper can launch a reflective attack to forge the receiver’s identity without being detected. addition, al.’s ASQKD assumes classical channel between sender receiver. It is considered illogical have in protocol. If these security issues are not addressed, will fail deliver secret key. Therefore, this study proposes efficient secure circumvent problems only photons. Security analysis proves that effectively avoid reflecting attacks, collective other typical attacks. Compared with existing protocols, has following advantages: based on photon, it demands less advanced quantum devices, communication efficiency higher than most reduces length of required pre-shared keys, endures there no need for

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticated Key Exchange Protocol Secure against Offline Dictionary Attack and Server Compromise

This paper introduces a new scheme, called Augmented Password AKE (APAKE), for authenticated key exchange protocols. In APAKE, a password is represented by a pair of values that is randomly selected in a huge space. We present an APAKE protocol. The protocol is secure against the attacks including off-line dictionary attack and server compromise allowing for subsequent off-line dictionary attac...

متن کامل

Secure Authenticated Key Exchange Protocol

From Seo and Sweeney proposed SAKA (Simple Authenticated Key agreement Algorithm), many SAKA variants were proposed to cope with the weaknesses in SAKA. However, they still are vulnerable to off-line password guessing attack. This paper proposes a new secure authenticated key exchange protocol that can resist off-line password guessing attack. To solve the vulnerability of former protocols, key...

متن کامل

Quantum Authenticated Key Distribution

Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...

متن کامل

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

By using Password-based Authenticated Key Exchange (PAKE), a server can authenticate a user who has only the same password shared with the server in advance and establish a session key with the user simultaneously. However, in the real applications, we may have a situation where a user needs to share a session key with server A, but the authentication needs to be done by a different server B th...

متن کامل

Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack

Despite the unconditionally secure theory of the Quantum Key Distribution (QKD), several attacks have been successfully implemented against commercial QKD systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2022

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math10081241