Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
304
result(s) for
"quantum authentication"
Sort by:
Quantum authentication method based on key-controlled maximally mixed quantum state encryption
2023
Quantum authentication is a fundamental first step that ensures secure quantum communication. Although various quantum authentication methods have been proposed recently, their implementation efficiency is limited. This paper proposes a key-controlled maximally mixed quantum state encryption (MMQSE) method using only a single qubit, unitary operation, minimized quantum transmissions, and a single qubit measurement, which improves implementation feasibility and operation efficiency. We applied it to representative quantum authentication applications, namely, quantum identity and message authentication. The security of our authentication schemes was verified by analyzing the relationship between the integral ratio of Uhlmann’s fidelity and probability of successful eavesdropping. Moreover, we demonstrate the higher authentication efficiency of the proposed scheme in a real quantum-channel noise environment. The upper bound of the valid noise rate was quantified using the integral ratio of Uhlmann’s fidelity in a noise environment. Finally, the optimal number of authentication sequences was estimated.
Journal Article
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party
by
Li, Xiang
,
Zhao, Xu
,
Zhang, Long
in
Atoms & subatomic particles
,
Authentication
,
Authentication protocols
2022
To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.
Journal Article
Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states
by
Lone, Muzaffar
,
Ahmed, Syed Hassan
,
Alkhambashi, Majid
in
Astronomy
,
Astrophysics and Cosmology
,
Atomic
2018
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General Nuser authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.
Journal Article
Asymmetric Bidirectional Quantum Communication with Device Authentication in IoT
2024
Quantum communication holds great potential for enhancing the security and efficiency of the Internet of Things (IoT). However, existing schemes often overlook device identity authentication, leaving systems vulnerable to unauthorized access, and rely on third-party controllers, which increase complexity and undermine trust. This paper proposes a novel asymmetric bidirectional quantum communication scheme tailored for IoT, integrating device identity authentication and information transmission without requiring third-party controllers. We provide a detailed description of the scheme’s application scenarios in IoT, conduct a security analysis of the identity authentication module, and experimentally validate the feasibility of the information transmission module. Additionally, we analyze the impact of quantum noise on the proposed scheme and compare it with existing approaches, highlighting its advantages in terms of resource consumption and efficiency.
Journal Article
Identity based secure authentication scheme based on quantum key distribution for cloud computing
2018
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user’s account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.
Journal Article
SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT
2022
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy. Privacy-preserving set intersection in IoT is used for a wide range of basic services, and its privacy protection issues have received widespread attention. The traditional candidate protocols to solve the privacy-preserving set intersection are classical encryption protocols based on computational difficulty. With the emergence of quantum computing, some advanced quantum algorithms may undermine the security and reliability of traditional protocols. Therefore, it is important to design more secure privacy-preserving set intersection protocols. In addition, identity information is also very important compared to data security. To this end, we propose a quantum privacy-preserving set intersection protocol for IoT scenarios, which has higher security and linear communication efficiency. This protocol can protect identity anonymity while protecting private data.
Journal Article
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
by
Alber, Gernot
,
Fladung, Lukas
,
Nikolopoulos, Georgios M.
in
Authentication
,
Coherent scattering
,
Continuity (mathematics)
2019
Optical physical unclonable keys are currently considered to be rather promising candidates for the development of entity authentication protocols, which offer security against both classical and quantum adversaries. In this work, we investigate the robustness of a continuous-variable protocol, which relies on the scattering of coherent states of light from the key, against three different types of intercept–resend emulation attacks. The performance of the protocol is analyzed for a broad range of physical parameters, and our results are compared to existing security bounds.
Journal Article
Quantum identity authentication based on the extension of quantum rotation
2023
In this work, we propose a bit-oriented QIA protocol based on special properties of quantum rotation and the public key cryptographic framework. The proposed protocol exhibited good resistance to both forward search and measure-resend attacks, whereby its security performance was directly related to the length of the authentication code. From our analysis, it was demonstrated that the protocol has good performance, in terms of quantum bit efficiency. In addition, the protocol is well-expandable. The developed protocol is resource-efficient and can be also applied in quantum computing networks.
Journal Article
An Attack on Zawadzki’s Quantum Authentication Scheme
by
Johnson, Floyd
,
González-Guillén, Carlos E.
,
Pérez del Pozo, Ángel L.
in
Authentication
,
conclusive exclusion
,
Cryptography
2021
Identification schemes are interactive cryptographic protocols typically involving two parties, a prover, who wants to provide evidence of their identity and a verifier, who checks the provided evidence and decides whether or not it comes from the intended prover. Given the growing interest in quantum computation, it is indeed desirable to have explicit designs for achieving user identification through quantum resources. In this paper, we comment on a recent proposal for quantum identity authentication from Zawadzki. We discuss the applicability of the theoretical impossibility results from Lo, Colbeck and Buhrman et al. and formally prove that the protocol must necessarily be insecure. Moreover, to better illustrate our insecurity claim, we present an attack on Zawadzki’s protocol and show that by using a simple strategy an adversary may indeed obtain relevant information on the shared identification secret. Specifically, through the use of the principal of conclusive exclusion on quantum measurements, our attack geometrically reduces the key space resulting in the claimed logarithmic security being reduced effectively by a factor of two after only three verification attempts.
Journal Article
Quantum Secret Sharing with Identity Authentication Based on GHZ States Entanglement Swapping
by
Zhong, Jifeng
,
Ruan, Banyao
,
Liu, Zhihao
in
Authentication
,
Communication
,
Denial of service attacks
2023
A quantum secret sharing scheme with identity authentication is proposed. By leveraging the measurement correlation of the GHZ states, conjugate measurement bases (X-basis and Y-basis) and bitwise XOR operation, the secret message sender, Alice, can authenticate the identities of other participants, namely Bob and Charlie. Once quantum identity authentication is established, Alice encrypts the secret message by mapping it into a local unitary operation on the GHZ particles based on the pre-agreed coding rules. With the entanglement swapping feature of GHZ states, Bob and Charlie can decode Alice’s secret message by utilizing Bell-basis measurement. The proposed scheme is characterized by its simple operation, high transmission efficiency and quantum bit utilization. Additionally, it demonstrates resilience against various common attacks, including interception retransmission attack, identity impersonation attack, denial of service attack, entangle-and-measure attack.
Journal Article