信息网络安全 ›› 2019, Vol. 19 ›› Issue (11): 43-48.doi: 10.3969/j.issn.1671-1122.2019.11.006

• 技术研究 • 上一篇    下一篇

基于Bell态的量子双向身份认证协议

张顺, 陈张凯, 梁风雨, 石润华()   

  1. 安徽大学计算机科学与技术学院,安徽合肥 230601
  • 收稿日期:2019-06-04 出版日期:2019-11-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:张顺(1982—),男,安徽,副教授,博士,主要研究方向为计算复杂性理论;陈张凯(1992—),男,安徽,硕士研究生,主要研究方向为量子通信安全;梁风雨(1996—),女,安徽,硕士研究生,主要研究方向为量子通信安全;石润华(1974—),男,安徽,教授,博士,主要研究方向为量子信息安全。

  • 基金资助:
    国家自然科学基金[61772001]

A Quantum Identity Authentication Based on Bell State

Shun ZHANG, Zhangkai CHEN, Fengyu LIANG, Runhua SHI()   

  1. School of Computer Science and Technology, Anhui University, Hefei Anhui 230601, China
  • Received:2019-06-04 Online:2019-11-10 Published:2020-05-11

摘要:

文章基于Bell态的纠缠性质提出一种可以进行双向身份认证的协议。与已有的量子身份认证协议相比,该协议没有第三方认证机构就能实现双方同时身份认证,避免了第三方认证机构的不安全因素。利用诱饵粒子和纠缠相关性检查保证认证双方之间传输的量子态不被改变,同时认证双方之间传输的经典信息是经过安全的单向哈希函数计算出来的,保证了该身份认证协议的安全性。该协议使用一个Bell态量子资源即可验证两比特密钥,节约了量子资源。认证双方所需执行的操作为经典异或操作,使得该协议具有易于实施的优点。分析表明,该协议可以有效防止拦截/重发攻击和中间人攻击等攻击方式。

关键词: 量子身份认证, 量子加密, 量子通信, Bell态

Abstract:

This paper proposes a new quantum identity authentication protocol based on Bell states which can realize two users simultaneously authenticate each other. Compared with previous quantum identity authentication protocols, this protocol can achieve bidirectional simultaneous identity authentication without the third party which is a trusted certification authority in some previous protocols. Therefore various unsafe factors are avoided in this protocol. The decoy-particle and entangle state’s correlation check method are used to ensure that the quantum states transmitted between the authentication parties are not changed. At the same time, the classical information transmitted between the authentication parties is calculated by the secure one-way Hash function, which can guarantee the security of the process of identity authentication. This protocol can certify two bits classical string with one Bell state which can save much quantum resources. The operations that users need to execute are classical XOR operations which make this protocol easier to be implemented. Analysis shows that this protocol can resist various inside and outside attacks such as intercept-resend attack and man-in-the-middle attack.

Key words: quantum identity authentication, quantum cryptography, quantum communication, Bell state

中图分类号: