Provably Secure and Password-Authenticated Quantum Key Agreement Protocol with Dynamic Basis

This paper presents password-authenticated quantum key agreement protocols (PAQKAPs) to guard security for internet era, which can combine classical cryptography and quantum cryptography in a universal way for the most common environment nowadays: Password. And PAQKAPs will guide in new directions for biometric-based with quantum cryptography, smart card-based with quantum cryptography and so on. Compared with the former research AQKDPs (authenticated quantum key distribution protocols), PAQKAPs have four merits: (1) the basis is dynamic against the long shared key revealed, (2) key agreement replaces key distribution for eliminating the server get the session key of the two users, (3) the server need not store the shared key with all the users, and the server only need keep its long secret key secret for saving storage space and avoiding verification table leakage, (4) any user need not store the shared key with the server, and s/he only keep the password in her/his brain. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the comparison with the related works.

[1]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[2]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[3]  Li Gong,et al.  Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.

[4]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[5]  J. Schwinger UNITARY OPERATOR BASES. , 1960, Proceedings of the National Academy of Sciences of the United States of America.

[6]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[7]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[8]  Xu Chen A(3,3) visual cryptography scheme for authentication , 2013 .

[9]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[10]  Tzonelih Hwang,et al.  Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.

[11]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[12]  King-Hang Wang,et al.  Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” , 2016, Nonlinear Dynamics.

[13]  D. J. Guan,et al.  A practical protocol for three-party authenticated quantum key distribution , 2014, Quantum Information Processing.

[14]  Haiyang Li,et al.  Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model , 2016, Int. J. Netw. Secur..

[15]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[16]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[17]  Emmanuel Bresson,et al.  Provably authenticated group Diffie-Hellman key exchange , 2001, CCS '01.

[18]  Chien-Ming Chen,et al.  On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..