Abstract | ||
---|---|---|
Shi et al. (Quantum Inf Process 14(6):2183–2193, 2015) proposed a novel quantum deniable authentication protocol in which new shared secret keys can be updated timely with the help of a trusted party, and the fact that only the specified receiver could identify the true source of a given message is guaranteed by the new shared secret keys generated in the key update phase. Hence, the core of Shi et al.’s protocol is the key update phase . However, the analysis in this paper shows that there is a bug in the key update phase, which can lead to the failure of updating the shared key. Furthermore, an improved simple method is proposed to mitigate the security weakness. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1007/s11128-018-2062-z | Quantum Information Processing |
Keywords | Field | DocType |
Quantum state,Quantum authentication,Key update,Deniability | Quantum,Quantum entanglement,Quantum mechanics,Quantum state,Theoretical computer science,Shared secret,Deniable authentication,Physics | Journal |
Volume | Issue | ISSN |
17 | 11 | 1570-0755 |
Citations | PageRank | References |
0 | 0.34 | 6 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hao Cao | 1 | 0 | 1.01 |
Wenping Ma | 2 | 12 | 4.75 |