SHI Weimin, WANG Yanmei, LI Leilei, ZHOU Yihua, YANG Yuguang, JIANG Nan. A Restricted Quantum Deniable Authentication Protocol Based on GHZ States[J]. Chinese Journal of Electronics, 2018, 27(2): 229-233. doi: 10.1049/cje.2018.01.001
Citation: SHI Weimin, WANG Yanmei, LI Leilei, ZHOU Yihua, YANG Yuguang, JIANG Nan. A Restricted Quantum Deniable Authentication Protocol Based on GHZ States[J]. Chinese Journal of Electronics, 2018, 27(2): 229-233. doi: 10.1049/cje.2018.01.001

A Restricted Quantum Deniable Authentication Protocol Based on GHZ States

doi: 10.1049/cje.2018.01.001
Funds:  This work is supported by the National Natural Science Foundation of China (No.61602019, No.U1636106, No.61572053) and the Scientific Research Common Program of Beijing Municipal Commission of Education (No.KM201510005016).
  • Received Date: 2017-03-02
  • Rev Recd Date: 2017-09-15
  • Publish Date: 2018-03-10
  • Utilizing the property of unitary transformation and Greenberger-Horne-Zeilinger (GHZ) states, a restricted quantum deniable authentication protocol is proposed. The protocol can provide that the sender can deny the content of the sent message, but cannot deny taking part in a certain communication. Security analysis results show that this protocol can satisfy known key security and the basic security requirements of restricted deniable authentication protocol such as completeness, restricted deniability, no-counterfeiting and can withstand impersonation attack, intercept-resend attack.
  • loading
  • Y. Yang, Y.G. Wang, W. Chen, et al., "Design of electronics for phase coding QKD system", Acta Sinica Electronica, Vol.39, No.11, pp.2604-2609, 2011. (in Chinese)
    C. Zhou, W.S. Bao and Q. Xiang, "Decoy-state quantum key distribution based on state-dependent imperfections", Acta Sinica of Electronica, Vol.40, No.11, pp.2015-2020, 2012. (in Chinese)
    K.F. Yu, C.W. Yang, C.H. Liao, et al., "Authenticated semiquantum key distribution protocol using Bell states", Quantum Information Process, Vol.13, No.6, pp.1457-1465, 2014.
    Z.W. Sun, J.W. Huang and P. Wang, "Efficient multiparty quantum key agreement protocol based on commutative encryption", Quantum Information Process, Vol.15, No.6, pp.2101-2111, 2016.
    C.H. Bennett, "Quantum cryptography using any two nonorthogonal states", Physical Review Letters, Vol.68, Article ID 3121, 12 papes, 1992.
    L. Goldenberg and L. Vaidman, "Quantum cryptography based on orthogonal states", Physical Review Letters, Vol.75, Article ID 1239, 10 papes, 1995.
    L.Y. Zhao, Z.Q. Yin and W. Chen, "Loss-tolerant measurementdevice-independent quantum private queries", Scientific Reports, Vol.7, Article ID 39733, 12 papes, 2017.
    R.H. Shi, Y. Mu and H. Zhong, "Privacy-preserving pointinclusion protocol for an arbitrary area based on phaseencodedquantum private query", Quantum Information Processing, Vol.16, Article ID 8, 10 papes, 2017.
    Y.G. Yang, Z.C. Liu and J. Li, "Quantum private query with perfect user privacy against a joint-measurement attack", Physics Letters, Vol.380, No.48, pp.4033-4038, 2016.
    Y.G. Yang, Z.C. Liu and X.B. Chen, "Novel classical postprocessing for quantum key distribution-based quantum private query", Quantum Information Processing, Vol.15, No.9, pp.3833-3840, 2016.
    D.G. Marangon, V. Giuseppe and V. Paolo, "Source-deviceindependent ultrafast quantum random number generation", Physical Review Letters, Vol.118, Article ID 060503, 11 papes, 2017.
    Y.Q. Nie, J.Y. Guan and H.Y. Zhou, "Experimental measurement-device-independent quantum random-number generation", Physical Review A, Vol.94, Article ID 060301, 13 papes, 2016.
    C. Zhu, H.Y. Zhou and X.F. Ma, "Loss-tolerant measurementdevice-independent quantum random number generation", New Journal of Physics, Vol.17, Article ID 125011, 10 papes, 2015.
    D.D. Li, Q.Y. Wen and Y.K. Wang, "Security of Semi-DeviceIndependent Random Number Expansion Protocols", Scientific Reports, Vol.5, No.10, pp.15543, 2015.
    X. Deng, C.H. Lee and H. Zhu, "Deniable authentication protocols", IEEE Proceedings-Computers and Digital Techniques, Vol.148, No.2, pp.101-104, 2001.
    Z.H. Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards & Interfaces, Vol.26, No.5, pp.449-454, 2004.
    W.B. Lee, C.C. Wu and W.J. Sui, "A novel deniable authentication protocol using generalized ElGamal signature scheme", Information Sciences, Vol.177, No.6, pp.1376-1381, 2007.
    W.M. Shi, Y.H. Zhou and Y.G. Yang, "Quantum deniable authentication protocol", Quantum Information Process, Vol.13, No.7, pp.1501-1510, 2014.
    W.M. Shi, Y.H. Zhou and Y.G. Yang, "A Real Quantum Designated Verifier Signature Scheme", Int J Theor Phys, Vol.54, No.9, pp.3115-3123, 2015.
    Wei-Min Shi, Jian-Biao Zhang, Yi-Hua Zhou, et al., "A novel quantum deniable authentication protocol without entanglement", Quantum Information Processing, Vol.14, No.6, pp.2183-2193, 2015.
    M.D. Raimondo and R. Gennaro, "New Approaches for Deniable Authentication", Journal of Cryptology, Vol.22, No.4, pp.572-615, 2005.
    C.Y. Fan, S.J. Zhou and F.G. Li, "An identity-based restricted deniable authentication protocol", IEEE International Symposium on Parallel and Distributed Processing with Applications IEEE, Chengdu, Sichuan, China, pp.474-478, 2009.
    F.G. Deng, G.L. Long and X.S. Liu, "Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block", Physical Review A, Vol.68, pp.042317, 2003.
    A.K. Ekert, "Quantum cryptography based on Bell theorem", Physical Review Letters, Vol.67, pp.661-664, 1991.
    S.K. Chong, C.W. Tsai and T. Hwang. "Improvement on quantum key agreement protocol with maximally entangled states", Int. J. Throe. Phys, Vol.50, No.6, pp.1793-1802, 2011.
    J. Lin, H.Y. Tseng and T. Hwang, "Intercept-resend attacks on Chen et al.'s quantum private comparison protocol and the improvements", Opt. Commun., Vol.284, No.9, pp.2412-2414, 2011.
    J. Lin and T. Hwang, "An enhancement on Shi et al.'s multiparty quantum secret sharing protocol", Opt. Commun, Vol.284, No.5, pp.1468-1471, 2011.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (173) PDF downloads(319) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return