共查询到20条相似文献,搜索用时 15 毫秒
1.
Recently, Sun et al. (Quantum Inf Process 15(5):2101–2111, 2016) proposed an efficient multiparty quantum key agreement protocol based on commutative encryption. The aim of this protocol is to negotiate a secret shared key among multiple parties with high qubit efficiency as well as security against inside and outside attackers. The shared key is the exclusive-OR of all participants’ secret keys. This is achieved by applying the rotation operation on encrypted photons. For retrieving the final secret key, only measurement on single states is needed. Sun et al. claimed that assuming no mutual trust between participants, the scheme is secure against participant’s attack. In this paper, we show that this is not true. In particular, we demonstrate how a malicious participant in Sun et al.’s protocol can introduce “a” final fake key to target parties of his choice. We further propose an improvement to guard against this attack. 相似文献
2.
In many circumstances, a shared key is needed to realize secure communication. Based on quantum mechanics principles, quantum key agreement (QKA) is a good method to establish a shared key by every party’s fair participation. In this paper, we propose a novel three-party QKA protocol, which is designed by using Greenberger–Horne–Zeilinger (GHZ) states. To realize the protocol, the distributor of the GHZ states needs only one quantum communication with the other two parties, respectively, and everyone performs single-particle measurements simply. Then, we extend the three-party QKA protocol to arbitrary multiparty situation. At last, we discuss the security and fairness of the multiparty protocol. It shows that the new scheme is secure and fair to every participant. 相似文献
3.
基于椭圆曲线密码体制(ECC),建立了一个高效可认证的组密钥协商协议。该方案具有如下特点:(1)协议仅需要两轮交互,就可以实现组密钥协商; (2)利用类ElGamal密码系统,无需使用密钥分享技术,因此减轻了各参与方的计算量与通信负担; (3) 协议能够抵抗自适应选择消息攻击。 相似文献
4.
集体噪声对量子密码协议的影响不可忽视,然而可抵抗集体噪声的多方量子密钥协商(MQKA)协议还很少。为了抵抗集体噪声的影响,分别针对可抗集体退相位噪声的逻辑单粒子和可抗集体旋转噪声的逻辑单粒子提出了两组逻辑酉算符,使得将其作用在逻辑单粒子上后,其中两个酉算符不改变测量基,而另外两个会改变测量基。基于此性质提出一个MQKA协议。首先,每个参与者传输逻辑单粒子给下一位;然后,该逻辑单粒子经过其他所有参与者的加密重新回到这个参与者,形成一个“环形”;最后,通过测量来获取共享密钥。安全性分析证明,该协议能够抵抗截取重发攻击、纠缠测量攻击以及参与者攻击;效率分析表明,该协议具有较高的量子比特效率。 相似文献
5.
一种高效的无证书三方密钥协商协议 总被引:1,自引:0,他引:1
对于目前提出的无证书三方密钥协商方案大都使用了耗费时间的对运算,具有较大的计算量,根据离散对数(DL)问题并以公钥密码学理论为基础,设计出一个不用到对运算的无证书三方密钥协商协议,该协议解决了基于身份的密钥协商中的密钥托管的问题。经过安全性证明和效率比较表明该协议有较高的安全性和效率。 相似文献
6.
王圣宝等(王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议.计算机学报,2007,30(10):1842-1854)提出的标准模型下可证明安全的基于身份的认证密钥协商协议不具有私钥产生中心(PKG)前向安全性。针对该安全缺陷,提出了一种新的基于身份的认证密钥协商协议,协议中给出了一种利用用户私钥和临时秘密信息联合计算共享秘密的方法,并在标准模型下证明了协议的安全性。与已有协议相比,新协议具有较高的执行效率。同时提出了一种PKG与用户共同协商私钥的方法,即用户的私钥由用户产生的部分秘密信息以及PKG的系统主密钥共同生成,从而有效解决了基于身份的认证密钥协商协议的PKG前向安全性问题。 相似文献
7.
现有的基于身份(ID)认证协议大多在CK模型中被证明是安全的,而CK模型比扩展的CK模型(eCK模型)更弱。基于NAXOS方法,利用双线性对设计了一种新协议,并基于随机预言假设和GBDH假设,在eCK模型中证明了协议的安全性。与其他的基于身份认证协议相比,新协议的计算复杂度和通信复杂度较低;满足主密钥前向安全性和完美前向安全性,并抗密钥泄漏伪装。 相似文献
8.
在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。无证书公钥密码是为了克服基于身份密码的密钥托管性质提出来的,它结合了传统公钥证书密码体系和基于身份的公钥体系的优点。应用椭圆曲线的配对运算,提出了一个两方的无证书密钥协商协议,其中每一方只需计算一个配对,并证明了它在ECK模型下的安全性。与其他无证书密钥协商协议相比,安全性和效率都更好。 相似文献
9.
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient. 相似文献
10.
11.
A feasible, secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol, the set of all (n) bidders is grouped into l subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All n bidders and auctioneer initiate one round of communication, and each of them prepares l copies of a \(\left( r-1\right) \)-partite entangled state (one for each sub-circle), where \(r=\frac{n}{l}+1\). The efficiency and security of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in l, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability are shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier. 相似文献
12.
13.
14.
15.
The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting \(N-1\) coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants’ cooperation. Here, \(t < N\). We hope the results of the presented paper will be helpful for further research on fair MQKA protocols. 相似文献
16.
王瑞民 《计算机工程与设计》2006,27(5):852-854
网络上进行保密通信,通信双方能否安全地进行,很大程度上取决于密钥的安全分配和协商。已有的密钥共识协议不能抵抗主动攻击。RSA密码体制用于身份验证时,不能抵抗乘法攻击。通过对LUC公钥密码体制的研究,给出了新的密钥共识协议,并为研究密钥共识问题提供了新的思路。新的协议可以抵抗被动攻击并发现主动攻击;储存密钥密文的攻击对本协议无效。 相似文献
17.
《国际计算机数学杂志》2012,89(13):2707-2716
Key agreement protocols are multi-party protocols in which entities exchange public information allowing them to create a common secret key that is known only to those entities and which cannot be predetermined by any party. Key agreement can be achieved using a public key infrastructure or identity-based cryptography. However, the former suffers from a heavy certificate management burden, while the latter is subject to the so-called key escrow problem. Recently, the notion of certificateless public key cryptography (CL-PKC) was introduced to mitigate these limitations. In this paper, we introduce the notion of three-party authenticated key agreement into CL-PKC and propose a concrete certificateless three-party authenticated key agreement protocol. We show that the proposed protocol is secure (i.e. conforms to defined security attributes) while being efficient. 相似文献
18.
This paper considers the issue on authenticated group key agreement protocol among n users broadcasting communication over an insecure public network. Many authenticated group Diffie-Hellman key agreement protocols have been proposed to meet the challenges. However, existing protocols are either limited by the use of public key infrastructure or by their scalability, requiring O(n) rounds. To overcome these disadvantages, we propose an efficient password-based group key agreement protocol resistant to the dictionary attacks by adding password-authentication services to a non-authenticated multi-party key agreement protocol proposed by Horng. The proposed protocol is very efficient since it only requires constant rounds to agree upon a session key, and each user broadcasts a constant number of messages and only requires four exponentiations. Under the Decisional Diffie-Hellman assumption, we will show the proposed protocol is provably secure in both the ideal-cipher model and the random-oracle model. 相似文献
19.
针对目前多方隐私集合比较(PSI)协议计算效率低下以及应用于云环境中会造成用户隐私信息泄露的问题,提出一种基于布隆过滤器(BF)和同态加密的云外包多方隐私集合比较协议。首先,协议中使用基于NTRU Cryptosystems的代理重加密算法将不同公钥加密的密文转换成相同公钥加密的密文,并将大量复杂的计算外包给云服务器;其次,借助BF计算复杂度低、空间利用率高和查询效率高的优点,提高协议运行过程中对信息加密、解密和查询的效率,在协议运行过程中用户仅需进行少量计算,无需交互且不必实时在线。理论分析及实验结果表明,新协议的计算复杂度和通信复杂度是线性的,可以在不泄露用户隐私信息的前提下计算出比较结果,满足现实应用的需求。 相似文献
20.
目前大多数移动IP注册协议都是采用对称密码体制和基于公钥密码体制相结合的方式来实现移动实体之间的相互认证,移动节点和外地代理之间没有认证,存在一定的安全缺陷。针对这种移动IP注册协议的认证安全问题,将无证书的三方密钥协商方案引入到移动IP的注册,提出了基于三方密钥协商的移动IP注册协议,实现移动节点、家乡代理和外地代理这三个实体的相互认证。分析结果表明,协议具有更高的安全性,且拥有较高的效率。 相似文献