Mutual authenticated quantum no-key encryption scheme over private quantum channel
- 20 Downloads
In this paper, we realize Shamir’s no-key protocol via quantum computation of Boolean functions and a private quantum channel. The proposed quantum no-key protocol has three rounds and provides mutual data origin authentication. Random Boolean functions are used to create entanglement and guarantee that any adversary without keys cannot pass the authentication. Thus, our protocol can resist the man-in-the-middle attack. A security analysis has shown that pieces of ciphertexts of the three rounds are completely mixed state. This property ensures no adversary can get any information about the sent message or authentication keys. Therefore, our protocol is unconditionally secure and its authentication keys can be reused.
Keywordsquantum cryptography no-key protocol quantum entanglement information-theoretical security private quantum channel
This work was supported by National Natural Science Foundation of China (Grant No. 61672517), National Cryptography Development Fund (Grant No. MMJJ20170108), National Key Research and Development Program of China (Grant No. 2017YFB0802502), and Fundamental Theory and Cutting Edge Technology Research Program of Institute of Information Engineering, CAS (Grant No. Y7Z0301103).
- 2.Yang L, Wu L A. Transmit classical and quantum information secretly. 2002, arXiv: quant-ph/0203089Google Scholar
- 3.Yang L, Wu L A, Liu S H. Quantum three-pass cryptography protocol. In: Proceedings of SPIE 2002 Quantum Optics in Computing and Communications, SPIE, 2009. 4917: 107–112Google Scholar
- 4.Kanamori Y, Yoo S M, Mohammad A S. A quantum no-key protocol for secure data communication. In: Proceedings of Proc 43rd Annual Southeast Regional Conference. New York: ACM Press, 2005. 2: 92–93Google Scholar
- 7.Yang L. Quantum no-key protocol for direct and secure transmission of quantum and classical messages. 2003, arXiv: quant-ph/0309200Google Scholar
- 8.Wu Y, Yang L. Practical quantum no-key protocol with identification. In: Proceedings of the 5th International Conference on Information Assurance and Security, Xi’an, 2009. 540–543Google Scholar
- 9.Yang L. Quantum no-key protocol for secure communication of classical message. 2013, arXiv: 1306.3388Google Scholar