研究目的
To propose a restricted quantum deniable authentication protocol based on GHZ states that satisfies the security requirement of restricted deniability, where the sender can deny the content of the sent message but cannot deny participating in a certain communication.
研究成果
The proposed restricted quantum deniable authentication protocol based on GHZ states satisfies the security requirement of restricted deniability, allowing the sender to deny the content of the sent message but not the participation in the communication. Future work will focus on improving the protocol's efficiency.
研究不足
The protocol's efficiency is 1/3, which may be improved in future studies. The security relies on the unconditional security of quantum key distribution and the properties of GHZ states.
1:Experimental Design and Method Selection:
The protocol involves three entities: a sender Alice, a receiver Bob, and an arbitrator Charlie. It includes three phases: Initialization, Authentication, and Verify. The protocol utilizes the property of unitary transformation and GHZ states.
2:Sample Selection and Data Sources:
The sender Alice shares 2n-bit secret key KAB with the receiver Bob and secret key KAC with the arbitrator Charlie. Charlie prepares n GHZ states and distributes them to Alice and Bob.
3:List of Experimental Equipment and Materials:
GHZ states, quantum channels for secure transmission, classical channels for encrypted communication.
4:Experimental Procedures and Operational Workflow:
Initialization involves sharing secret keys and distributing GHZ states. Authentication involves generating authentication information for a message. Verify involves verifying the authenticity of the message.
5:Data Analysis Methods:
Security analysis is performed to ensure the protocol meets the requirements of completeness, restricted deniability, no-counterfeiting, and resistance to impersonation and intercept-resend attacks.
独家科研数据包,助您复现前沿成果,加速创新突破
获取完整内容