Skip to main content
Top
Published in: Quantum Information Processing 5/2021

01-05-2021

One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement

Authors: Jingjing Yang, Zexi Li, Jinzhao Wu, Hongfeng Zhu

Published in: Quantum Information Processing | Issue 5/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security, efficiency and universality are the major concerns in distributed computation for how to get the services securely as there are a large number of nodes that require interactive authentication and key negotiation. These become more challenging especially for the semi-quantum environment as it is highly complicated and heterogeneous in nature. Most of the existing techniques reported in the literature are having high computation and communication costs, which reduce their importance for applicability in real-world environment. Moreover, these schemes are all classical computing environment without any quantum device, which make them are vulnerable to unknown attacks because they are all based on the computation complexity. Hence, in this paper, we propose a new semi-quantum key agreement protocol based on Multiple Servers to Server Architecture protocol. The protocol is used for mutual authentication, key agreement, login and other operations between classical users and two quantum servers. The main innovations of this scheme are that the classical users can log in to another unregistered quantum server in any domain with the help of their registered quantum server, and it has high security and efficiency, but also has universality and intergrade from classical devices to quantum era. Due to the semi-honest attribute is based on quantum techniques, the registered quantum server cannot get the session key between the user and the unregistered server. Finally, we have done a detailed comparative analysis for the communication and computation costs along with security and functionality features which proves its efficiency in comparison to the other existing schemes of its category.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Asadi, F.K., Kimiaee, A.F., Wein, S.C., Simon, C.: Protocols for long-distance quantum communication with single 167Er ions. Quantum Sci. Technol. 5(4), 1 (2020)CrossRef Asadi, F.K., Kimiaee, A.F., Wein, S.C., Simon, C.: Protocols for long-distance quantum communication with single 167Er ions. Quantum Sci. Technol. 5(4), 1 (2020)CrossRef
2.
go back to reference Elo, M.: Understanding quantum computing. Microw. J. 63(9), 6–14 (2020) Elo, M.: Understanding quantum computing. Microw. J. 63(9), 6–14 (2020)
3.
go back to reference Bennett, C.H.: Quantum cryptography: public key distribution and coin tossing. In: Proceeding of IEEE International Conference Computers Systems and Signal Processing Bangalore India (1984) Bennett, C.H.: Quantum cryptography: public key distribution and coin tossing. In: Proceeding of IEEE International Conference Computers Systems and Signal Processing Bangalore India (1984)
4.
go back to reference Lorenzo, G.C., Currás, L.G., Mohsen, R.: Finite-key analysis for memory-assisted decoy-state quantum key distribution. New J. Phys. 22(10), 103005 (2020)MathSciNetCrossRef Lorenzo, G.C., Currás, L.G., Mohsen, R.: Finite-key analysis for memory-assisted decoy-state quantum key distribution. New J. Phys. 22(10), 103005 (2020)MathSciNetCrossRef
5.
go back to reference Long, G.L., et al.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 32302–32302 (2002)ADSCrossRef Long, G.L., et al.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 32302–32302 (2002)ADSCrossRef
6.
go back to reference Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)ADSCrossRef Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)ADSCrossRef
7.
go back to reference Jin, X.R., Ji, X., Zhang, Y.Q., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1–2), 67–70 (2006)ADSCrossRef Jin, X.R., Ji, X., Zhang, Y.Q., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1–2), 67–70 (2006)ADSCrossRef
9.
go back to reference Kao, S.H., Hwang, T.: Controlled quantum dialogue robust against conspiring users. Quantum Inf. Process. 15(10), 4313–4324 (2016)ADSMathSciNetCrossRef Kao, S.H., Hwang, T.: Controlled quantum dialogue robust against conspiring users. Quantum Inf. Process. 15(10), 4313–4324 (2016)ADSMathSciNetCrossRef
10.
go back to reference Yun-Jie, X., Zhong-Xiao, M.: Controlled quantum N-party simultaneous direct communication. Commun. Theor. Phys. 48(1), 79–82 (2007)ADSMathSciNetCrossRef Yun-Jie, X., Zhong-Xiao, M.: Controlled quantum N-party simultaneous direct communication. Commun. Theor. Phys. 48(1), 79–82 (2007)ADSMathSciNetCrossRef
11.
go back to reference Tian-Yu, Y., Li-Zhen, J.: Improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30(4), 040305 (2013)CrossRef Tian-Yu, Y., Li-Zhen, J.: Improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30(4), 040305 (2013)CrossRef
12.
go back to reference Chang, C.H., Luo, Y.P., Yang, C.W., Hwang, T.: Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14(9), 3515–3522 (2015)ADSMathSciNetCrossRef Chang, C.H., Luo, Y.P., Yang, C.W., Hwang, T.: Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14(9), 3515–3522 (2015)ADSMathSciNetCrossRef
13.
go back to reference Kao, S.H., KHwang, T.: Controlled quantum dialogue using cluster states. Quantum Inf. Process. 16(5), 139 (2017)ADSCrossRef Kao, S.H., KHwang, T.: Controlled quantum dialogue using cluster states. Quantum Inf. Process. 16(5), 139 (2017)ADSCrossRef
14.
go back to reference Qi, J.M., Xu, G., Chen, X.B., Wang, T.Y., Cai, X.Q., Yang, Y.X.: Two authenticated quantum dialogue protocols based on three-particle entangled states. Quantum Inf. Process. 17, 9 (2018)ADSMathSciNetCrossRef Qi, J.M., Xu, G., Chen, X.B., Wang, T.Y., Cai, X.Q., Yang, Y.X.: Two authenticated quantum dialogue protocols based on three-particle entangled states. Quantum Inf. Process. 17, 9 (2018)ADSMathSciNetCrossRef
15.
16.
go back to reference Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: IEEE International Symposium on Information Theory (2015) Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: IEEE International Symposium on Information Theory (2015)
17.
go back to reference Zhang, W., Qiu, D., Mateus, P.: Security of a single-state semi-quantum key distribution protocol. Quantum Inf. Process. 17(6), 1–21 (2018)MathSciNetMATH Zhang, W., Qiu, D., Mateus, P.: Security of a single-state semi-quantum key distribution protocol. Quantum Inf. Process. 17(6), 1–21 (2018)MathSciNetMATH
18.
go back to reference Zou, X.F., Qiu, D.W.: Three-step semi-quantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696–1702 (2014)ADSCrossRef Zou, X.F., Qiu, D.W.: Three-step semi-quantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696–1702 (2014)ADSCrossRef
19.
go back to reference Zhang, M.H., Li, H.F., Xia, Z.Q., Feng, X.Y., Peng, J.Y.: Semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 16(5), 117 (2017)ADSCrossRef Zhang, M.H., Li, H.F., Xia, Z.Q., Feng, X.Y., Peng, J.Y.: Semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 16(5), 117 (2017)ADSCrossRef
20.
go back to reference Sun, Y., Yan, L., Chang, Y., Zhang, S., Shao, T., Zhang, Y.: Two semi-quantum secure direct communication protocols based on Bell states. Mod. Phys. Lett. A 34(1), 1950004 (2019)ADSCrossRef Sun, Y., Yan, L., Chang, Y., Zhang, S., Shao, T., Zhang, Y.: Two semi-quantum secure direct communication protocols based on Bell states. Mod. Phys. Lett. A 34(1), 1950004 (2019)ADSCrossRef
21.
go back to reference Chen, X.B., Wang, Y.L., Xu, G., et al.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 2019, 1–1 (2019) Chen, X.B., Wang, Y.L., Xu, G., et al.: Quantum network communication with a novel discrete-time quantum walk. IEEE Access 2019, 1–1 (2019)
22.
go back to reference Zhu, H.-F.: Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple servers to server architecture. Wirel. Person. Commun. 82(3), 1697–1718 (2015)CrossRef Zhu, H.-F.: Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple servers to server architecture. Wirel. Person. Commun. 82(3), 1697–1718 (2015)CrossRef
23.
go back to reference Zhu, H.F., Zhang, Y.F., Xia, Y., Li, H.Y.: Password-authenticated key exchange scheme using chaotic maps towards a new architecture in standard model. Int. J. Netw. Secur. 18(2), 326–334 (2016) Zhu, H.F., Zhang, Y.F., Xia, Y., Li, H.Y.: Password-authenticated key exchange scheme using chaotic maps towards a new architecture in standard model. Int. J. Netw. Secur. 18(2), 326–334 (2016)
24.
go back to reference Chang, C.H., Luo, Y.P., Yang, C.W., et al.: Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14(9), 3515–3522 (2015)ADSMathSciNetCrossRef Chang, C.H., Luo, Y.P., Yang, C.W., et al.: Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14(9), 3515–3522 (2015)ADSMathSciNetCrossRef
25.
go back to reference Zhu, D., Wang, X., Zhu, H.: Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting. Quantum Inf. Process. 19(10), 1–18 (2020)ADSMathSciNet Zhu, D., Wang, X., Zhu, H.: Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting. Quantum Inf. Process. 19(10), 1–18 (2020)ADSMathSciNet
26.
go back to reference Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–190 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–190 (2002)ADSCrossRef
28.
go back to reference Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. Int. J. Very Large Data Bases 15(4), 316–333 (2006)CrossRef Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. Int. J. Very Large Data Bases 15(4), 316–333 (2006)CrossRef
Metadata
Title
One-round semi-quantum-honest key agreement scheme in MSTSA structure without entanglement
Authors
Jingjing Yang
Zexi Li
Jinzhao Wu
Hongfeng Zhu
Publication date
01-05-2021
Publisher
Springer US
Published in
Quantum Information Processing / Issue 5/2021
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03123-y

Other articles of this Issue 5/2021

Quantum Information Processing 5/2021 Go to the issue