A Smart Card-Based Three-Party Quantum Key Distribution Protocol
The quantum key distribution (QKD) protocols become the trend research in the computer security field today because those are very strong to prevent the eavesdropping during communication domain. In addition, an existence of the third party as the Trust Center (TC) presents the higher security level and the more effective key distribution such as 3QKDPMA and 3PAQKD-TB. The TC has responsibilities to construct the session key and to authenticate the user on a communication session. Moreover, the TC should have the high-security level to assure all communications done under the secure condition. The 3QKDPMA and 3PAQKD-TB provide the effective method for creating the session key. However, the basic QKD protocol mentioned in this paper do not provide the advanced user authentication. It is because TC only maintains the user’s secret key table which is used to authenticate each legal user. To improve the basic QKD protocol, we propose a new scheme for QKD by elaborating the 3PAQKD-TB with the smart card secure user authentication. Finally, it is a lightweight computation approach in order to achieve more efficiently to the basic QKD protocol by using elliptic curve cryptography.
KeywordsUser authentication QKD smart card elliptic curve cryptography
Unable to display preview. Download preview PDF.
- 1.Hsing-Chung Chen, Syuan-Zong Lin, and Tzu-Liang Kung, “Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint,”Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012Google Scholar
- 2.Charles H.Bennett, Gilles Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Theoretical Computer Science, Vol. 560, Part 1, pp. 7–11, 2014Google Scholar
- 3.Heri Wijayanto, Min-Shiang Hwang, “Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance,” International Journal of Network Security, Vol 17, No.2, pp. 160-164, 2015Google Scholar
- 4.Charles. H. Bennett, “Quantum Cryptography Using Any Two Nonorthogonal States,” Physical Review Letters, Vol. 68, No. 2, pp. 3121-3124, 1992Google Scholar
- 5.Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, Boca Raton, London, New York, Washington D.C., 1996Google Scholar
- 6.Tzonelih Hwang, Kuo-Chang Lee, and Chuan-Ming Li, “Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols,” IEEE Transactions on Dependable and Secure Computing, Vol. 4, No. 1, January-March, 2007Google Scholar
- 7.MAGIQ QPN 8505 Uncompromising VPN Security TM, http://www.magiqtech.com/Products_files/8505_Data_Sheet.pdf, accessed in Aug. 24th, 2016.J
- 8.Tzonelih Hwang, Yihwa Chen, Chi-Sung Laih, “Non-Interactive Password Authentications without Password Tables,” In Proceedings of IEEE Region 10-th Conference on Computer and Communication Systems, Hong Kong, Sep., 1990Google Scholar
- 9.Valerio Scarani, Christian Kurtsiefer, “The black paper of quantum cryptography: Real implementation problems,” Theoretical Computer Science, Vol. 560, pp. 27–32Google Scholar
- 10.Tang Hong-Bin, Liu Xin-Song, Jiang Lei, “A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance”, International Journal of Network Security, Vol. 15, No.6, PP.446-454, Nov., 2013Google Scholar