DocumentCode :
3097966
Title :
A “Ping-pong” Protocol with Authentication
Author :
Zuning, Chen ; Zheng, Qin
Author_Institution :
Dept. of Comput. Sci. & Technol., Xi´´an Jiaotong Univ., Xi´´an, China
fYear :
2010
fDate :
15-17 June 2010
Firstpage :
1805
Lastpage :
1810
Abstract :
The quantum secure direct communication is a new-style quantum communication scheme. It arouses much interest recently. The ping-pong protocol proposed by Bostroem and Felbinger is one of relatively mature quantum secure direct communication protocols, which is asymptotically secure under Eve´s eavesdropping attack. But it ignores the message authentication. Being aimed at this problem, we propose a novel ping-pong protocol with authentication. The former has two operation modes, or the message mode and the control mode, which are used to send message and detect Eve´s attack, respectively. But it just detects Eve´s eavesdropping attack and does not authenticate the sent message in the control mode. The latter has also the above two operation modes, which employs a braid-based key agreement protocol for both the parties participating in communication to share a secret, whose size and magnitude are undecided in advance. Using the shared secret, it not only detects Eve´s eavesdropping attack, but also effectively performs the message authentication in the control mode. It is also asymptotically secure under Eve´s eavesdropping attack. The security of the proposed protocol is based on the no-cloning theorem, the correlations of quantum entanglement and the fact that the p-th root finding problem on braid groups is intractable even on quantum computers, as well as classical computers. In addition different from the original ping-pong protocol, the communication was initiated by the sender Alice instead of by the receiver Bob. This corresponds to the way of common communications. The present protocol not only can resist the attacks known recently, but should be experimentally feasible using today´s technology.
Keywords :
cryptographic protocols; message authentication; quantum cryptography; quantum entanglement; telecommunication security; braid-based key agreement protocol; control mode; eavesdropping attack; message authentication; message mode; no-cloning theorem; ping-pong protocol; quantum cryptography; quantum entanglement; quantum secure direct communication; Communication system control; Computer science; Cryptographic protocols; Cryptography; Message authentication; Physics; Quantum computing; Quantum entanglement; Quantum mechanics; Switches; Bell states; braid group; ping-pong protocol; quantum cryptography; quantum secure direct communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial Electronics and Applications (ICIEA), 2010 the 5th IEEE Conference on
Conference_Location :
Taichung
Print_ISBN :
978-1-4244-5045-9
Electronic_ISBN :
978-1-4244-5046-6
Type :
conf
DOI :
10.1109/ICIEA.2010.5515357
Filename :
5515357
Link To Document :
بازگشت