Skip to main content
Log in

A Novel Quantum Dragonfly Multi-Key Exchange Protocol beyond Conventional Attacks

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Dragonfly Key Exchange Protocol (DFKEP) is a kind of simple authentication key exchange protocol based on low-entropy shared password between two nodes, aiming to construct an efficient and secure scheme with better user experience for guarding security for internet era. Furthermore, DFKEP has been submitted to the Internet Engineering Task Force as a candidate standard for general internet use. Unfortunately, the original DFKEP has some flaws, such as vulnerable to off-line guessing attack and kinds of passive and active attacks. Combining quantum technology, this paper presents an enhanced DFKEP, called Quantum Dragonfly Multi-key Exchange Protocol (QDFMKEP), which can eliminate DFKEP’s flaws and output multiple session keys in one transaction. Moreover, compared with the former research AQKDPs (authenticated quantum key distribution protocols) and DFKEP, QDFMKEP has four merits: (1) the basis is dynamic against the long shared password revealed, (2) key agreement replaces key distribution for eliminating the server get the session key of the two users, (3) any user’s device need not store information for saving storage space and avoiding verification table leakage, and s/he only keep the password in her/his brain, (4) output multiple session keys. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the comparison with the related works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Zhu, H., Zhang, Y.: An efficient chaotic maps-based deniable authentication group key agreement protocol. Wirel. Pers. Commun. 96(1), 217–229 (2017)

    Article  Google Scholar 

  2. Harkins, D.: Dragonfly key exchange - internet research task force internet draft. https://www.rfc-editor.org/rfc/rfc7664.txt (2012). Accessed Nov 2015

  3. Clancy, T., Tschofenig, H.: Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method, RFC 5433. https://doi.org/10.17487/RFC5433, https://www.rfc-editor.org/info/rfc5433 (2009)

  4. Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol Version 2 (IKEv2), RFC 5996. https://doi.org/10.17487/RFC5996, https://www.rfc-editor.org/info/rfc5996 (2010)

  5. Harkins, D.: Simultaneous authentication of equals: A secure, password-based key exchange for mesh networks, sensor technologies and applications, 2008. SENSORCOMM ’08. Second International Conference on. IEEE (2008)

  6. Clarke, D., Hao, F.: Cryptanalysis of the dragonfly key exchange protocol. Information Security Iet 8(6), 283–289 (2014)

  7. Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Physical Rev. A, 61(2), 22303 (2000)

  8. Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Information Theory. 49, 457–475 (2003)

    Article  MathSciNet  Google Scholar 

  9. Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4(1), 71–80 (2007)

    Article  Google Scholar 

  10. Guan, D.J., Wang, Y.-J., Zhuang, E.S.: A practical protocol for three-party authenticated quantum key distribution. Quantum Inf. Process. 13, 2355–2374 (2014)

    Article  MathSciNet  ADS  Google Scholar 

  11. Cusumano, M.A.: The business of quantum computing. Commun. ACM 61(10), 20–22 (2018)

  12. Zhu, H., Wang, X., Chen, C.M., Kumari, S.: Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Computers & Electrical Engineering. 86, 106714 (2020)

    Article  Google Scholar 

  13. He, Y.F., Ma, W.P.: Multiparty quantum secure direct communication immune to collective noise. Quantum Inf. Process. 18, 4 (2019)

    Article  MathSciNet  ADS  Google Scholar 

  14. Schwinger, J.: Unitary operator bases. Proc. Natl. Acad. Sci. U. S. A. 46(4), 570–579 (1960)

    Article  MathSciNet  ADS  Google Scholar 

  15. Wootters, W.K., Zurek, W.H.: A Single Quantum Cannot Be Cloned. Nat. 299, 802–803 (1992)

    Article  ADS  Google Scholar 

  16. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals. 37(3), 669–674 (2008)

    Article  MathSciNet  ADS  Google Scholar 

  17. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory. 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  18. Islam, S.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3), 2261–2276 (2014)

    Article  Google Scholar 

  19. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. Proc. Eighth ACM Conf. Computer and Comm. Security. 255–264 (2001)

  20. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. of Modern Physics. 74, 145–190 (2002)

    Article  ADS  Google Scholar 

  21. Jarecki, S., Kiayias, A., Krawczyk, H.: Round-optimal password-protected secret sharing and T-PAKE in the password-only model. International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg (2014)

  22. Li, G.: Efficient network authentication protocols: lower bounds and optimal implementations. Distrib. Comput. 9(3), 131–145 (1995)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Liaoning Provincial Natural Science Foundation of China (Grant No. 2019-MS-286), and Basic Scientific Research Project of Liaoning Provincial Department of Education (Grant No. LJC202007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongfeng Zhu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, T., Wang, C. & Zhu, H. A Novel Quantum Dragonfly Multi-Key Exchange Protocol beyond Conventional Attacks. Int J Theor Phys 60, 115–130 (2021). https://doi.org/10.1007/s10773-020-04668-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-020-04668-x

Keywords

Navigation