Abstract
Dragonfly Key Exchange Protocol (DFKEP) is a kind of simple authentication key exchange protocol based on low-entropy shared password between two nodes, aiming to construct an efficient and secure scheme with better user experience for guarding security for internet era. Furthermore, DFKEP has been submitted to the Internet Engineering Task Force as a candidate standard for general internet use. Unfortunately, the original DFKEP has some flaws, such as vulnerable to off-line guessing attack and kinds of passive and active attacks. Combining quantum technology, this paper presents an enhanced DFKEP, called Quantum Dragonfly Multi-key Exchange Protocol (QDFMKEP), which can eliminate DFKEP’s flaws and output multiple session keys in one transaction. Moreover, compared with the former research AQKDPs (authenticated quantum key distribution protocols) and DFKEP, QDFMKEP has four merits: (1) the basis is dynamic against the long shared password revealed, (2) key agreement replaces key distribution for eliminating the server get the session key of the two users, (3) any user’s device need not store information for saving storage space and avoiding verification table leakage, and s/he only keep the password in her/his brain, (4) output multiple session keys. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the comparison with the related works.
Similar content being viewed by others
References
Zhu, H., Zhang, Y.: An efficient chaotic maps-based deniable authentication group key agreement protocol. Wirel. Pers. Commun. 96(1), 217–229 (2017)
Harkins, D.: Dragonfly key exchange - internet research task force internet draft. https://www.rfc-editor.org/rfc/rfc7664.txt (2012). Accessed Nov 2015
Clancy, T., Tschofenig, H.: Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method, RFC 5433. https://doi.org/10.17487/RFC5433, https://www.rfc-editor.org/info/rfc5433 (2009)
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol Version 2 (IKEv2), RFC 5996. https://doi.org/10.17487/RFC5996, https://www.rfc-editor.org/info/rfc5996 (2010)
Harkins, D.: Simultaneous authentication of equals: A secure, password-based key exchange for mesh networks, sensor technologies and applications, 2008. SENSORCOMM ’08. Second International Conference on. IEEE (2008)
Clarke, D., Hao, F.: Cryptanalysis of the dragonfly key exchange protocol. Information Security Iet 8(6), 283–289 (2014)
Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Physical Rev. A, 61(2), 22303 (2000)
Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Information Theory. 49, 457–475 (2003)
Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4(1), 71–80 (2007)
Guan, D.J., Wang, Y.-J., Zhuang, E.S.: A practical protocol for three-party authenticated quantum key distribution. Quantum Inf. Process. 13, 2355–2374 (2014)
Cusumano, M.A.: The business of quantum computing. Commun. ACM 61(10), 20–22 (2018)
Zhu, H., Wang, X., Chen, C.M., Kumari, S.: Two novel semi-quantum-reflection protocols applied in connected vehicle systems with blockchain. Computers & Electrical Engineering. 86, 106714 (2020)
He, Y.F., Ma, W.P.: Multiparty quantum secure direct communication immune to collective noise. Quantum Inf. Process. 18, 4 (2019)
Schwinger, J.: Unitary operator bases. Proc. Natl. Acad. Sci. U. S. A. 46(4), 570–579 (1960)
Wootters, W.K., Zurek, W.H.: A Single Quantum Cannot Be Cloned. Nat. 299, 802–803 (1992)
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals. 37(3), 669–674 (2008)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory. 29(2), 198–208 (1983)
Islam, S.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3), 2261–2276 (2014)
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. Proc. Eighth ACM Conf. Computer and Comm. Security. 255–264 (2001)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. of Modern Physics. 74, 145–190 (2002)
Jarecki, S., Kiayias, A., Krawczyk, H.: Round-optimal password-protected secret sharing and T-PAKE in the password-only model. International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg (2014)
Li, G.: Efficient network authentication protocols: lower bounds and optimal implementations. Distrib. Comput. 9(3), 131–145 (1995)
Acknowledgements
This work was supported by the Liaoning Provincial Natural Science Foundation of China (Grant No. 2019-MS-286), and Basic Scientific Research Project of Liaoning Provincial Department of Education (Grant No. LJC202007).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, T., Wang, C. & Zhu, H. A Novel Quantum Dragonfly Multi-Key Exchange Protocol beyond Conventional Attacks. Int J Theor Phys 60, 115–130 (2021). https://doi.org/10.1007/s10773-020-04668-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-020-04668-x