This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice's secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks.
The advent of next-generation networks, such as fifth-generation cellular wireless (5G), has transformed every aspect of our lives and promised improvement for various real-life applications. Recently, Liu and Wang proposed a dynamic quantum private comparison protocol that utilizes the property of single photon, in both polarization and spatial-mode degrees of freedom. The protocol is intended to compare the private information of any two parties in n parties with the support of the other n-2 parties. However, we show that their protocol is not secure against a particular strategy of collusion attacks that leads to the problem of information leakage. Therefore, this paper suggests a security enhancement against the proposed attack strategy trying to overcome the security limitation of Liu and Wang's work. The security analysis of the suggested improvement proved that the modified protocol is secure against both the internal and external attacks, which could be used to control the various auction models for 5G services as wireless network virtualization in a secure way.INDEX TERMS Next generation mobile network, quantum private comparison protocol, single photon in both polarization and spatial-mode degrees of freedom, collusion attack.
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.