提出了一种新的基于混沌的量子身份认证方案,该方案将混沌系统对初值条件和参数的极度敏感性及混沌序列的良好伪随机性与量子密码的绝对安全性结合在一起,能够有效地抵抗多次身份认证中由于有限精度导致的混沌特性退化而造成对混沌系统初值和参数的攻击.在方案的实现过程中,利用量子隐形传态原理,解决了多次身份认证中出现的混沌迭代异步问题,实现了每一次身份认证中双方的同步,从而实现了“一次一密”的量子身份认证.整个身份认证过程实现简单,具有动态性和可证明的安全性.
参考文献
[1] | Wang Youwei.The Research of Theory and Methods is Chaotic Encrypt Communication System(混沌保密通信理论及方法研究)[D].Jilin:Doctorial Dissertation of Jilin University,2007 (in Chinese). |
[2] | Zhou Fucai,Gao Kening,Cao Guanghui,et al.Identity authentication mechanism based on chaotic theory and its security analysis[J].Mini-Micro Systems(小型微型计算机系统),2003,24(12):2088-2091 (in Chinese). |
[3] | Li Shujun.Cryptanalysis of a class of chaotic stream ciphers[J].Journal of Electronics and Information Technology (电子与信息学报),2003,25(4):473-478 (in Chinese). |
[4] | Jin Chenhui,Gao Haiying.Analysis of two stream ciphers based on chaos[J].Acta Electronica Sinica(电子学报),2004,32(7):1066-1070 (in Chinese). |
[5] | Wu Xiaogang,Hu Hanping,Zhang Baoliang.Parameter estimation only from the symbolic sequences generated by chaos system[J].Chaos,Solitons and Fractals,2004,22(2):359-366. |
[6] | Zeng Guihua,Zhang Weiping.Identity verification in quantum cryptography[J].Phys.Rev.A,2000,61(2):022303/1-5. |
[7] | Zeng Guihua.Quantum identity authentication without trusted-party[J].Acta Electronica Sinica(电子学报),2004,32(7):1148-1151 (in Chinese). |
[8] | Zhou Nanrun,Zeng Guihua,Zeng Wenjie,et al.Cross-center quantum identity authentication scheme based on teleportation and entanglement swapping[J].Optics Communications,2005,254(4-6):380-388. |
[9] | Gong Jing,He Min,Deng Yuanqing,et al.Quantum identity authentication based on network[J].Acta Sinica Quantum Optica(量子光学学报),2009,15(4):336-341 (in Chinese). |
[10] | Zeng Guihua.Quantum Cryptography (量子密码学)[M].Beijing:Science Press,2006:98-103 (in Chinese). |
[11] | Dai Zhaoyang.Quantum Key Distribution Based on Chaos (基于混沌的量子密钥分配研究)[D].Xi'an:Masterial Thesis of Northwest University,2010 (in Chinese). |
[12] | Cao Zhengwen,Dai Zhaoyang,Xu Ping,et al.A study on quantum key expansion method based on chaos[C].The 2nd International Conference on Information Science and Engineering (ICISE2010),2010,4320-4323 (in Chinese). |
[13] | Bennett C H,Brassard G.Quantum cryptography:public key distribution and coin tossing[C].Proc.of IEEE International Conference on Computers,Systems and Signal Processing,Bangalore,India,1984,175-179. |
[14] | Zhou Nanrun,Zeng Guihua,Zhu Fuchen,et al.The quantum synchronous communication protocol for two-army problem[J].Journal of Shanghai Jiaotong University(上海交通大学学报),2006,40(11):1555-1559 (in Chinese). |
上一张
下一张
上一张
下一张
计量
- 下载量()
- 访问量()
文章评分
- 您的评分:
-
10%
-
20%
-
30%
-
40%
-
50%