簡易檢索 / 詳目顯示

研究生: 林子翰
Lin, Tzu-Han
論文名稱: 量子秘密通訊與認證
Quantum Secret Communication with Authentication
指導教授: 黃宗立
Hwang, Tzonelih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 33
中文關鍵詞: 中間人攻擊量子密碼學量子秘密通訊與認證
外文關鍵詞: Man-in-the-middle Attack, Quantum Cryptography, Quantum Secret Communication with Authentication
相關次數: 點閱:70下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隱私權一直是現代人十分重視的權力之一,為了保護隱私,密碼便由此產生了。自此之後,密碼便在各式各樣的需求上被使用著。密碼,變成一種學問亦稱之為密碼學,研究著如何能更安全、祕密的保護或傳送資訊。
    現今,主流的密碼使用與研究為公私鑰加解密系統。公私鑰加解密系統的安全建立於數學計算的複雜度上,只要計算複雜度足夠,便可以讓密文於有效期限內不被他人計算出原文而洩露隱私或機密。
    然而,量子計算的出現使得原有的計算複雜度安全不再可靠。藉由量子的特性,量子計算擁有強大的平行運算能力,許多的計算難題皆可以此平行運算能力解決。而另一方面,依著量子的特性亦開始不同的形式的密碼學─量子密碼學。
    不同於傳統密碼學,量子密碼學可以檢測竊聽者的存在並且達到理論上的安全。現今,已存在許多量子密碼學的相關研究與應用,例如:量子金鑰分配、量子秘密通訊等等。本論文將針對量子秘密通訊與認證來討論相關的安全議題。
    量子秘密通訊與認證是一重要的量子密碼學研究,其主要目標是讓想要通訊的雙方可以透過量子安全的傳送祕密訊息並且認證對方的身分。由於環境設定的不同,量子秘密通訊與認證協定所要面對挑戰便與其他多數的協定不同。
    首先,本論文將指出多數量子秘密通訊與認證協定的共通缺陷。此缺陷將使得竊聽者可以進行中間人攻擊去獲得私密訊息,並且有能力去偽造一私密訊息傳與另一方。然後,本論文提出相對應的改進方法。之後,探討三方參與者的環境。在一個不誠實的第三方協助需要秘密通訊的雙方進行量子秘密通訊與認證協定情況下,其第三方可以使用偽冒身分、竄改及中間人攻擊手段,來使得秘密通訊不再安全合適。最後,本論文提出一對應的方法,藉由通訊雙方的再次檢查,使得量子秘密通訊與認證協定可以免去第三方攻擊的問題。

    Privacy is currently one of the most crucial issues. Cryptography has been developed for protecting privacy and is used ubiquitously. Cryptography is also under investigation to develop a more secure approach to protect or transmit information.
    The most popular cryptosystem for applications and studies is the public-key cryptosystem. The security of most of the public-key cryptosystem is based on computational complexity, which can be easily solved by quantum computer.
    This is because based on quantum mechanism features, quantum computers possess the powerful ability of parallel computing to solve numerous computing problems in a short period. Consequently, another type of cryptography, also based on quantum mechanism features, is quantum cryptography.
    Differing from traditional cryptography, quantum cryptography detects eavesdroppers and achieves a theoretical security level. There are numerous applications and studies in quantum cryptography such as quantum key distribution and quantum secret communication. The focus of this thesis is on the security of quantum secret communication with authentication (QSCA).
    QSCA, which allows two communicants to communicate directly and to authenticate each other in public channels, is a crucial research in quantum cryptography. Because of different environment assumptions, the challenges of QSCA protocols differ from other quantum cryptography protocols.
    This thesis indicates a common shortcoming of QSCA protocols that allows an eavesdropper to execute a man-in-the-middle (MIM) attack to uncover the secret message and forge a secret message to the receiver. Consequently, a possible solution is proposed. Second, a discussion is presented regarding QSCA protocols in three-party agents, a third party Trent, and two communicants. A dishonest Trent can perform impersonate attack, modification attack, and MIM attack to undermine the security of QSCA protocols. Finally, the thesis provides a possible solution to check the quantum state by the two communicants, to enable the QSCA protocol to prevent the dishonest Trent.

    中文摘要 I Abstract III List of Tables VIII List of Figures IX Chapter 1 Introduction 1 1.1 Overview 1 1.2 Motivation and Contribution 2 1.3 Thesis Structure 3 Chapter 2 Preliminaries 4 2.1 Quantum Computing 4 2.1.1 The Properties of Single Photons 4 2.1.2 The Properties of Einstein-Podolsky-Rosen (EPR) Pair 5 2.1.3 The Quantum Unitary Operations 6 2.2 Quantum Secret Communication with Authentication Protocol 6 Chapter 3 Two-party Quantum Secure Communication with Authentication 8 3.1 Liu et al.’s Protocol 8 3.2 Attacks on Liu et al.’s Protocol 11 3.2.1 Modification Attack 11 3.2.2 Man-in-the-middle Attack 12 3.3 Improvement Protocol 14 3.4 Security Analysis 17 Chapter 4 Three-party Quantum Secure Communication with Authentication 20 4.1 Yen et al.’s Protocol 20 4.2 Attacks on Yen et al.’s Protocol 25 4.2.1 Intercept-resend Attack 25 4.2.2 Impersonation Attack 26 4.2.3 Modification Attack 27 4.3 Improvement Protocol 28 Chapter 5 Future Work/ Conclusion 30 Bibliography 31

    [1] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978.
    [2] W. Diffie and M. E. Hellman, "New directions in cryptography," Ieee Transactions on Information Theory, vol. 22, pp. 644-654, 1976.
    [3] T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," in Advances in Cryptology. vol. 196, G. Blakley and D. Chaum, Eds., ed: Springer Berlin Heidelberg, 1985, pp. 10-18.
    [4] P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM journal on computing, vol. 26, pp. 1484-1509, 1997.
    [5] C. H. Bennett and G. Brassard, "Quantum Cryptography: Public key distribution and coin tossing," In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179, 1984.
    [6] T. Y. Wang, Q. Y. Wen, and F. C. Zhu, "Secure authentication of classical messages with single photons," Chinese Physics B, vol. 18, pp. 3189-3192, Aug 2009.
    [7] T.-Y. Wang, Q.-Y. Wen, and F.-C. Zhu, "Secure authentication of classical messages with decoherence-free states," Optics Communications, vol. 282, pp. 3382-3385, 2009.
    [8] W. J. Liu, H. W. Chen, T. H. Ma, Z. Q. Li, Z. H. Liu, and W. B. Hu, "An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication," Chinese Physics B, vol. 18, pp. 4105-4109, Oct 2009.
    [9] Y. Y. Kanamori, Seong-Moo; Gregory, Don, A.; Sheldon, Frederick, T. , "Authentication protocol using quantum superposition states," International Journal of Network Security, vol. 9, pp. 101-108, 2009.
    [10] Z.-N. Q. Chen, Zheng; Lu, Lei, "A Quantum Secure Direct Commuuication with Authentication," Information Technology Journal, vol. 8, pp. 1027-1032, 2009.
    [11] D. Liu, C. X. Pei, D. X. Quan, and N. Zhao, "A New Quantum Secure Direct Communication Scheme with Authentication," Chinese Physics Letters, vol. 27, p. 050306, May 2010.
    [12] F. Gao, S.-J. Qin, F.-Z. Guo, and Q.-Y. Wen, "Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States," Chinese Physics Letters, vol. 28, p. 020303, 2011.
    [13] P. Huang, J. U. N. Zhu, Y. Lu, and G.-H. Zeng, "Quantum Identity Authentication Using Gaussian-Modulated Squeezed States," International Journal of Quantum Information, vol. 09, pp. 701-721, 2011.
    [14] M. Naseri, "An Efficient Protocol for Quantum Secure Dialogue with Authentication by Using Single Photons," International Journal of Quantum Information, vol. 09, pp. 1677-1684, 2011.
    [15] C.-W. Tsai, T.-S. Wei, and T. Hwang, "One-Way Quantum Authenticated Secure Communication Using Rotation Operation," Communications in Theoretical Physics, vol. 56, pp. 1023-1026, 2011.
    [16] D. Shen, W. Ma, X. Yin, and X. Li, "Quantum Dialogue with Authentication Based on Bell States," International Journal of Theoretical Physics, 2012.
    [17] Y.-G. Yang, X. Jia, J. Xia, L. Shi, and H. Zhang, "Comment on “Quantum Secure Direct Communication with Authentication Expansion Using Single Photons”," International Journal of Theoretical Physics, vol. 51, pp. 3681-3687, 2012.
    [18] C.-H. Yu, G.-D. Guo, and S. Lin, "Quantum Secure Direct Communication with Authentication Using Two Nonorthogonal States," International Journal of Theoretical Physics, 2012.
    [19] J. Wang, Q. Zhang, and C. J. Tang, "Multiparty simultaneous quantum identity authentication based on entanglement swapping," Chinese Physics Letters, vol. 23, pp. 2360-2363, Sep 2006.
    [20] H. Lee, J. Lim, and H. Yang, "Quantum direct communication with authentication," Physical Review A, vol. 73, Apr 2006.
    [21] Z.-j. Zhang, J. Liu, D. Wang, and S.-h. Shi, "Comment on “Quantum direct communication with authentication”," Physical Review A, vol. 75, 2007.
    [22] M.-J. Wang and W. Pan, "Quantum Secure Direct Communication Based on Authentication," Chinese Physics Letters, vol. 25, pp. 3860-3863, 2008.
    [23] W.-J. Liu, H.-W. Chen, Z.-Q. Li, and Z.-H. Liu, "Efficient quantum secure direct communication with authentication," Chinese Physics Letters, vol. 25, pp. 2354-2357, 2008.
    [24] C. A. Yen, S. J. Horng, H. S. Goan, T. W. Kao, and Y. H. Chou, "Quantum Direct Communication with Mutual Authentication," Quantum Information & Computation, vol. 9, pp. 376-394, May 2009.
    [25] S. J. Qin, Q. Y. Wen, L. M. Meng, and F. C. Zhu, "High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security," Chinese Physics Letters, vol. 26, p. 020312, Feb 2009.
    [26] Y.-G. Yang and Q.-Y. Wen, "Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states," Chinese Physics B, vol. 18, pp. 3233-3237, 2009.
    [27] J. Yang, C. Wang, and R. Zhang, "Quantum Secure Direct Communication with Authentication Expansion Using Single Photons," Communications in Theoretical Physics, vol. 54, pp. 829-834, 2010.
    [28] Y. G. Yang, Y. H. Wang, and Q. Y. Wen, "Quantum broadcast communication with authentication," Chinese Physics B, vol. 19, p. 070304, Jul 2010.
    [29] Y.-G. Yang, J. Tian, J. Xia, and H. Zhang, "Quantum Authenticated Direct Communication Using Bell States," International Journal of Theoretical Physics, vol. 52, pp. 336-344, 2012.
    [30] Y.-G. Yang, H.-Y. Wang, X. Jia, and H. Zhang, "A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States," International Journal of Theoretical Physics, vol. 52, pp. 524-530, 2012.
    [31] Z. S. Zhang, G. H. Zeng, N. R. Zhou, and J. Xiong, "Quantum identity authentication based on ping-pong technique for photons," Physics Letters A, vol. 356, pp. 199-205, Aug 7 2006.
    [32] A. Einstein, B. Podolsky, and N. Rosen, "Can quantum-mechanical description of physical reality be considered complete?," Physical review, vol. 47, p. 777, 1935.
    [33] Z. J. Zhang, J. Liu, D. Wang, and S. H. Shi, "Comment on "Quantum direct communication with authentication"," Physical Review A, vol. 75, Feb 2007.
    [34] C.-W. Yang and T. Hwang, "Improved QSDC Protocol over a Collective-Dephasing Noise Channel," International Journal of Theoretical Physics, vol. 51, pp. 3941-3950, Dec 2012.
    [35] C.-W. Yang, T. Hwang, and T.-H. Lin, "Modification Attack on QSDC with Authentication and the Improvement," International Journal of Theoretical Physics, pp. DOI: 10.1007/s10773-013-1498-2, 2013/01/01 2013.

    無法下載圖示 校內:2018-08-29公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE