计算机与现代化 ›› 2025, Vol. 0 ›› Issue (09): 50-54.doi: 10.3969/j.issn.1006-2475.2025.09.007

• 信息安全 • 上一篇    下一篇

一种基于量子安全直接通信的身份鉴权协议

  


  1. (1.国网安徽省电力有限公司,安徽 合肥 230009; 2.国网安徽省电力有限公司电力科学研究院,安徽 合肥 230601;
    3.南京南瑞信息通信科技有限公司,江苏 南京 211100) 
  • 出版日期:2025-09-24 发布日期:2025-09-24
  • 作者简介: 作者简介:王松(1983—),男,安徽合肥人,高级工程师,硕士,研究方向:电力系统自动化,E-mail: 19383576537@163.com; 李圆智(1990 —),男,安徽马鞍山人,高级工程师,硕士,研究方向:电力监控系统网络安全,E-mail: 360706209@qq.com; 陈伟(1988—),男,安徽绩溪人,高级工程师,硕士,研究方向:电力监控系统网络安全,E-mail: 13721067099@qq.com; 通信作者:卞宇翔(1990 —),男,江苏南京人,工程师,硕士,研究方向:量子保密通信,E-mail: bianyuxiang@sgepri.sgcc.com.cn。
  • 基金资助:
    基金项目:国网安徽省电力有限公司科技项目(SGAHDK00DJJS2200312)

Quantum Identity Authentication Protocol Based on Quantum Secure Direct Communication


  1. (1. State Grid Anhui Electric Power Co., Ltd., Hefei 230009, China;
    2. Electric Power Science Research Institute of State Grid Anhui Electric Power Co., Ltd., Hefei 230601, China;
    3. Nanjing Nanrui Information and Communication Technology Co., Ltd., Nanjing 211100, China) 
  • Online:2025-09-24 Published:2025-09-24

摘要:
摘要:为了确保身份鉴权的安全性,基于量子安全直接通信原理,提出一种不暴露身份验证密钥信息即可验证用户身份的鉴权协议。该协议使用单光子量子态作为载体,无需量子态存储器和任何纠缠光子源,从而提升量子身份鉴权协议在当前技术条件下的可行性。该协议由安全检测和身份鉴权2个阶段组成。在安全检测阶段,通信双方首先使用诱骗态序列来检测量子信道的安全,以抵御非法攻击。在身份鉴权阶段,通信双方通过身份鉴权序列来确认对方的身份。安全性分析表明,该协议能有效抵御常见攻击,为一个安全的量子身份鉴权协议。对比分析表明,该协议在实用性和有效性上相比于其他协议有一定优势。

关键词: 关键词:量子身份鉴权, 量子安全直接通信, 量子密码, 量子信息, 量子计算

Abstract:
Abstract: To ensure the security of identity authentication, a novel authentication protocol based on quantum-secure direct communication is proposed. This protocol can verify user identities without exposing the verification key information. It utilizes single-photon quantum states as carriers, eliminating the need for quantum state memories and any entangled photon sources, thereby enhancing the feasibility of quantum identity authentication under current technological conditions. The protocol comprises two stages: security detection and identity authentication. During the security detection stage, the communicating parties first use decoy sequences to check the security of the quantum channel, effectively resisting unauthorized attacks. In the identity authentication stage, the parties confirm each other’s identity through identity authentication sequences. Security analysis shows that this protocol can effectively withstand common attacks, making it a secure quantum identity authentication method. Comparative analysis indicates that this protocol has advantages in practicality and effectiveness over other existing protocols.

Key words: Key words: quantum identity authentication, quantum secure direct communication, quantum cryptography, quantum information, quantum computation

中图分类号: