中国物理B ›› 2023, Vol. 32 ›› Issue (5): 50310-050310.doi: 10.1088/1674-1056/ac9b31

• • 上一篇    下一篇

Improved quantum key agreement protocol with authentication

Ji-Hong Guo(郭继红)1,2,3, Ming-Qiang Bai(柏明强)1,2,3,†, Xiao-Yan Lei(雷小燕)1,2,3, Jia-Xin Xie(谢佳欣)1,2,3, and Zhi-Wen Mo(莫智文)1,2,3   

  1. 1 Institute of Intelligent Information and Quantum Information, Sichuan Normal University, Chengdu 610068, China;
    2 Research Center of Sichuan Normal University, National-Local Joint Engineering Laboratory of System Credibility Automatic Verification, Chengdu 610066, China;
    3 School of Mathematical Sciences, Sichuan Normal University, Chengdu 610068, China
  • 收稿日期:2022-06-29 修回日期:2022-09-22 接受日期:2022-10-19 出版日期:2023-04-21 发布日期:2023-04-21
  • 通讯作者: Ming-Qiang Bai E-mail:baimq@sicnu.edu.cn
  • 基金资助:
    Project supported by the National Science Foundation of Sichuan Province, China (Grant No. 2022NSFSC0534), Major Science, and Techonolgy Application Demonstration Project in Chengdu (Grant No. 2021-YF09-0116-GX).

Improved quantum key agreement protocol with authentication

Ji-Hong Guo(郭继红)1,2,3, Ming-Qiang Bai(柏明强)1,2,3,†, Xiao-Yan Lei(雷小燕)1,2,3, Jia-Xin Xie(谢佳欣)1,2,3, and Zhi-Wen Mo(莫智文)1,2,3   

  1. 1 Institute of Intelligent Information and Quantum Information, Sichuan Normal University, Chengdu 610068, China;
    2 Research Center of Sichuan Normal University, National-Local Joint Engineering Laboratory of System Credibility Automatic Verification, Chengdu 610066, China;
    3 School of Mathematical Sciences, Sichuan Normal University, Chengdu 610068, China
  • Received:2022-06-29 Revised:2022-09-22 Accepted:2022-10-19 Online:2023-04-21 Published:2023-04-21
  • Contact: Ming-Qiang Bai E-mail:baimq@sicnu.edu.cn
  • Supported by:
    Project supported by the National Science Foundation of Sichuan Province, China (Grant No. 2022NSFSC0534), Major Science, and Techonolgy Application Demonstration Project in Chengdu (Grant No. 2021-YF09-0116-GX).

摘要: In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process. Finally, security analysis shows that this scheme is resistant to some important attacks.

关键词: quantum key agreement, authentication, six-particle entangled states

Abstract: In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process. Finally, security analysis shows that this scheme is resistant to some important attacks.

Key words: quantum key agreement, authentication, six-particle entangled states

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Hk (Quantum communication) 03.67.Ac (Quantum algorithms, protocols, and simulations)