Skip to main content
Erschienen in: Quantum Information Processing 9/2018

01.09.2018

High-dimensional quantum threshold anonymous identity authentication scheme

verfasst von: Xiuli Song, Yanbing Liu, Hongyao Deng, Yonggang Xiao

Erschienen in: Quantum Information Processing | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the existing quantum identity authentication (QIA) schemes, single-party QIA needs to run authentication process multiple times for multi-user system. (n, n) multi-party QIA does not consider some special occasions such as user’s illness, travel. Anonymous QIA only considers how to protect users’ privacy but overlooks the efficiency of authentication process. In this paper, a high-dimensional quantum threshold anonymous identity authentication (HDQTAIA) scheme is proposed to overcome these limits. In HDQTAIA, each user adds private token to his/her own particle by performing d-dimensional generalized Pauli operator. When a manager performs a projective measurement on his/her two particles, with d-dimensional entanglement swapping, the tokens of any t out of n users are aggregated into the particle of the Server. The Server judges whether the authentication is successful or not by checking hash value of the aggregated token. Property analysis shows that HDQTAIA has \( \ge t \) authentications simultaneity, token unforgeability and identity anonymity. Security analysis shows that HDQTAIA can resist intercept-resend, entangle-measure, forgery, collusion and Trojan horse attacks. Performance comparison shows that HDQTAIA has better universality and flexibility, and offers lower resource consumption, computation and communication overheads than other similar QIA schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Luo, S., Hu, J., Chen, Z.: An identity-based one-time password scheme with anonymous authentication. In: International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, pp. 864–867 (2009) Luo, S., Hu, J., Chen, Z.: An identity-based one-time password scheme with anonymous authentication. In: International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, pp. 864–867 (2009)
2.
Zurück zum Zitat Cao, X., Zeng, X., Kou, W., Hu, L.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7), 3508–3517 (2009)CrossRef Cao, X., Zeng, X., Kou, W., Hu, L.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7), 3508–3517 (2009)CrossRef
3.
Zurück zum Zitat Gao, T., Miao, Q., Guo, N.: Anonymous authentication scheme based on proxy group signature for wireless mesh network. In: Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 533–537 (2014) Gao, T., Miao, Q., Guo, N.: Anonymous authentication scheme based on proxy group signature for wireless mesh network. In: Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 533–537 (2014)
4.
Zurück zum Zitat Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for vanets. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRef Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for vanets. IEEE Trans. Veh. Technol. 65(3), 1711–1720 (2016)CrossRef
5.
Zurück zum Zitat Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654–3658 (2011)ADSCrossRef Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654–3658 (2011)ADSCrossRef
6.
Zurück zum Zitat Shi, R.H., Mu, Y., Zhong, H., Zhang, S., Cui, J.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370(C), 147–158 (2016)CrossRef Shi, R.H., Mu, Y., Zhong, H., Zhang, S., Cui, J.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370(C), 147–158 (2016)CrossRef
7.
Zurück zum Zitat Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64(6), 168–173 (2001)CrossRef Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64(6), 168–173 (2001)CrossRef
8.
Zurück zum Zitat Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(65), 882–886 (2002) Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(65), 882–886 (2002)
9.
Zurück zum Zitat Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 543–551 (2005) Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 543–551 (2005)
10.
Zurück zum Zitat Chien, C.H., Lin, T.S., Chang, T.H., Yuan, S.Y.: Quantum authentication protocol using entanglement swapping. In: Nanotechnology. IEEE, pp. 1533–1537 (2011) Chien, C.H., Lin, T.S., Chang, T.H., Yuan, S.Y.: Quantum authentication protocol using entanglement swapping. In: Nanotechnology. IEEE, pp. 1533–1537 (2011)
11.
12.
Zurück zum Zitat Yuan, H., Liu, Y.M., Pan, G.Z., Zhang, G., Zhou, J., Zhang, Z.J.: Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf. Process. 13(11), 2535–2549 (2014)ADSMathSciNetCrossRefMATH Yuan, H., Liu, Y.M., Pan, G.Z., Zhang, G., Zhou, J., Zhang, Z.J.: Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf. Process. 13(11), 2535–2549 (2014)ADSMathSciNetCrossRefMATH
13.
14.
Zurück zum Zitat Portmann, C.: Quantum authentication with key recycling. pp. 339–368 (2017) Portmann, C.: Quantum authentication with key recycling. pp. 339–368 (2017)
15.
16.
17.
Zurück zum Zitat Wang, J., Zhang, Q., Tang, C.J.: Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 23(9), 2360–2363 (2006)ADSCrossRef Wang, J., Zhang, Q., Tang, C.J.: Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 23(9), 2360–2363 (2006)ADSCrossRef
18.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeilinger states. Chin. Phys. B 18(8), 3233–3237 (2009)ADSCrossRef Yang, Y.G., Wen, Q.Y.: Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeilinger states. Chin. Phys. B 18(8), 3233–3237 (2009)ADSCrossRef
19.
Zurück zum Zitat Yang, Y.G., Wang, H.Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 52(2), 524–530 (2013)MathSciNetCrossRefMATH Yang, Y.G., Wang, H.Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 52(2), 524–530 (2013)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)ADSCrossRef
21.
Zurück zum Zitat Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65(4), 579–589 (2002)CrossRef Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65(4), 579–589 (2002)CrossRef
22.
Zurück zum Zitat Thas, K.: The geometry of generalized pauli operators of n-qudit hilbert space, and an application to mubs. EPL 86(86), 60005 (2009)ADSCrossRef Thas, K.: The geometry of generalized pauli operators of n-qudit hilbert space, and an application to mubs. EPL 86(86), 60005 (2009)ADSCrossRef
23.
Zurück zum Zitat Diao, Z.J., Huang, C.F., Wang, K.: Quantum counting: algorithm and error distribution. Acta. Appl. Math. 118(1), 147–159 (2012)MathSciNetCrossRefMATH Diao, Z.J., Huang, C.F., Wang, K.: Quantum counting: algorithm and error distribution. Acta. Appl. Math. 118(1), 147–159 (2012)MathSciNetCrossRefMATH
25.
Zurück zum Zitat Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef
26.
Zurück zum Zitat Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum key-distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum key-distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef
Metadaten
Titel
High-dimensional quantum threshold anonymous identity authentication scheme
verfasst von
Xiuli Song
Yanbing Liu
Hongyao Deng
Yonggang Xiao
Publikationsdatum
01.09.2018
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 9/2018
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-1969-8

Weitere Artikel der Ausgabe 9/2018

Quantum Information Processing 9/2018 Zur Ausgabe

Neuer Inhalt