北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2005, Vol. 28 ›› Issue (1): 92-95.doi: 10.13190/jbupt.200501.92.dujzh

• 研究报告 • 上一篇    下一篇

抵抗多次拦截攻击的量子密钥分发中的身份认证

杜建忠1,2, 朱甫臣   

  1. 1.北京邮电大学 理学院, 北京 100876; 2.西安电子科技大学 综合业务网国家重点实验室, 西安 710071; 3.现代通信国家重点实验室, 成都 610041
  • 出版日期:2005-02-28 发布日期:2005-02-28

Identity Verification in Quantum Key Distribution for Resisting Attack of Multi-Time Interceptions

DU Jian-zhong, ZHU Fu-chen   

  1. 1. School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2. State Key Laboratory of Integrated Services Network, Xidian University, Xi'an 710071, China;
    3. State Key Laboratory of Modern Communications, Chengdu 610041, China
  • Online:2005-02-28 Published:2005-02-28

摘要:

指出多次拦截技术对于经典身份认证是无意义的,但是在设计量子身份认证协议时必须要考虑这种攻击手段,故认为主动攻击者利用多次拦截技术,可以测量携带身份信息的确定粒子的多个副本,准确地获得粒子的态,成功地攻破近年分别由Daniel Ljunggren和Zeng Guihua等人发表的2个量子身份认证协议。给出的量子身份认证协议中引入了基于时间参数和认证密钥的伪随机序列,使攻击者进行的拦截次数只有达到时间参数长度的指数级,才能获得同一粒子的副本,逃避了多次拦截攻击。

关键词: 量子密码, 身份认证, 拦截攻击

Abstract:

The attack of multi-time interceptions must be considered in the protocols of quantum identity verification, though it makes no sense in its classical counterpart. By this means, an active attacker could precisely obtain the state of the particle carrying the identity verification information, when he measured enough copies of the particle. So the two protocols released lately by Daniel Ljunggren et al and Zeng Guihua et al respectively could be broken. Based on the pseudorandom bit generator with time parameters and the verification keys, the identity verification protocol in quantum key distribution proposed can avoid the attack because the attacker has to intercept exponential times in the length of time parameters to obtain just one copy of a particle.

Key words: quantum cryptography, identity verification, interception attack

中图分类号: