Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)

A Simple Deniable Authentication Protocol Based on Quantum Key Distribution

Authors
Chen-hui JIN, Zhi-yong LI, Su-hua LIAO
Corresponding Author
Chen-hui JIN
Available Online December 2016.
DOI
10.2991/cnct-16.2017.112How to use a DOI?
Keywords
Deniable, Authentication, Quantum key distribution.
Abstract

A deniable authentication protocol enables a receiver to identify the true source of given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Recently, Shi et al. proposed a quantum deniable authentication protocol based on the property of unitary transformation and quantum one-way function. A trusted center (TC) is introduced in their protocol, and a much amount of quantum resources, such as entanglement, quantum memory and quantum one-way function, are required. In this paper, a deniable authentication protocol without a trust center is proposed based on the quantum key distribution (QKD). In the presented protocol, the QKD is used firstly to share a secret key between the sender and the receiver. Then, the shared key is used to identify the true source of sender's message by the receiver. Finally, the simulation based proof shows that the receiver cannot prove the identity of the sender to any third party.

Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)
Series
Advances in Computer Science Research
Publication Date
December 2016
ISBN
978-94-6252-301-2
ISSN
2352-538X
DOI
10.2991/cnct-16.2017.112How to use a DOI?
Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Chen-hui JIN
AU  - Zhi-yong LI
AU  - Su-hua LIAO
PY  - 2016/12
DA  - 2016/12
TI  - A Simple Deniable Authentication Protocol Based on Quantum Key Distribution
BT  - Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)
PB  - Atlantis Press
SP  - 805
EP  - 810
SN  - 2352-538X
UR  - https://doi.org/10.2991/cnct-16.2017.112
DO  - 10.2991/cnct-16.2017.112
ID  - JIN2016/12
ER  -