A Simple Deniable Authentication Protocol Based on Quantum Key Distribution
- 10.2991/cnct-16.2017.112How to use a DOI?
- Deniable, Authentication, Quantum key distribution.
A deniable authentication protocol enables a receiver to identify the true source of given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Recently, Shi et al. proposed a quantum deniable authentication protocol based on the property of unitary transformation and quantum one-way function. A trusted center (TC) is introduced in their protocol, and a much amount of quantum resources, such as entanglement, quantum memory and quantum one-way function, are required. In this paper, a deniable authentication protocol without a trust center is proposed based on the quantum key distribution (QKD). In the presented protocol, the QKD is used firstly to share a secret key between the sender and the receiver. Then, the shared key is used to identify the true source of sender's message by the receiver. Finally, the simulation based proof shows that the receiver cannot prove the identity of the sender to any third party.
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Chen-hui JIN AU - Zhi-yong LI AU - Su-hua LIAO PY - 2016/12 DA - 2016/12 TI - A Simple Deniable Authentication Protocol Based on Quantum Key Distribution BT - Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016) PB - Atlantis Press SP - 805 EP - 810 SN - 2352-538X UR - https://doi.org/10.2991/cnct-16.2017.112 DO - 10.2991/cnct-16.2017.112 ID - JIN2016/12 ER -