Abstract
As is known, quantum key distribution (QKD) can provide information-theoretic security under some preconditions, one of which is that the identity of each participant has been authenticated. And quantum identity authentication (QIA) can achieve this precondition effectively. However, the adversary still can implement man-in-the-middle attacks on QKD protocols in some situations, such as the protocol in [Quant. Inf. Process, 18, 137 (2019)]. In the above paper, the authors claimed that, after their QIA protocol based on GV95 system (GV95-QIA protocol), the participants could perform GV95-QKD protocol to update and extend the authentication keys. However, this method is not secure in the sense that the adversary could wait for the participants to complete GV95-QIA protocol and then perform the man-in-the-middle attack on the QKD process. In this paper, we solve this problem by mixing GV95-QIA process and GV95-QKD process randomly. Specifically, two authenticated QKD protocols are proposed based on the above idea. The proposed protocols can be used to provide secure identity authentication to GV95-QKD protocol, and also can be used to extend the authentication keys for GV95-QIA protocol.
Highlights
The development of quantum computation poses a serious threat to the public key cryptography algorithms such as RSA [1], but it promotes quantum cryptography [2] that can withstand the powerful computing power of quantum computers
In this paper, we proposed two authenticated quantum key distribution (QKD) protocols based on GV95 communication system [43]
We first present an interim scheme by mixing the process of GV95-QKD protocol [44] and GV95-quantum identity authentication (QIA) protocol [43] randomly
Summary
The development of quantum computation poses a serious threat to the public key cryptography algorithms such as RSA [1], but it promotes quantum cryptography [2] that can withstand the powerful computing power of quantum computers. The information-theoretic security of quantum cryptographic protocols is based on several necessary conditions, one of which is the secure identity authentication [3]. The purpose of mixing is to ensure that the adversary cannot discriminate between a QIA signal and a QKD signal so that he cannot attack the QKD process through bypassing the QIA process This scheme is still not secure against the man-in-the-middle attack. GV95-QKD PROTOCOL Utilizing the cryptographic scheme based on a Mach-Zehnder interferometer in Fig. 1,1 Alice can generate secure keys with. After the reflection of the mirrors and the action of BS2, the state of the photon position changes from Eqs. 1 and 2 to. Bob can check D0 (D1) to decode the key, where D0 (D1) clicking indicates the current bit of the key is 0 (1)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.