Skip to main navigation Skip to search Skip to main content

Multi-Party Cryptographic Key Distribution Protocol over a Public Network Based on a Quick-Response Code

  • Wen Kai Yu*
  • , Ying Yang
  • , Ya Xin Li
  • , Ning Wei
  • , Shuo Fei Wang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In existing cryptographic key distribution (CKD) protocols based on computational ghost imaging (CGI), the interaction among multiple legitimate users is generally neglected, and the channel noise has a serious impact on the performance. To overcome these shortcomings, we propose a multi-party interactive CKD protocol over a public network, which takes advantage of the cascade ablation of fragment patterns (FPs). The server splits a quick-response (QR) code image into multiple FPs and embeds different “watermark” labels into these FPs. By using a CGI setup, the server will acquire a series of bucket value sequences with respect to different FPs and send them to multiple legitimate users through a public network. The users reconstruct the FPs and determine whether there is an attack in the public channel according to the content of the recovered “watermark” labels, so as to complete the self-authentication. Finally, these users can extract their cryptographic keys by scanning the QR code (the cascade ablation result of FPs) returned by an intermediary. Both simulation and experimental results have verified the feasibility of this protocol. The impacts of different attacks and the noise robustness have also been investigated.

Original languageEnglish
Article number3994
JournalSensors
Volume22
Issue number11
DOIs
Publication statusPublished - 1 Jun 2022

Keywords

  • computational ghost imaging
  • cryptographic key distribution
  • identity authentication
  • multi-party communication
  • quick-response code
  • watermark embedding and extraction

Fingerprint

Dive into the research topics of 'Multi-Party Cryptographic Key Distribution Protocol over a Public Network Based on a Quick-Response Code'. Together they form a unique fingerprint.

Cite this