Quantum key distribution with authentication

نویسندگان

  • Guihua Zeng
  • Xinmei Wang
چکیده

The security of the previous quantum key distribution (QKD) protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In fact, the previous QKD protocols is un secure without authentication in practical communication. In this paper, we proposed an improved QKD protocol that can simultaneously distribute the quantum secret key and verify the communicators’ identity. This presented authentication scheme is provably secure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secured Communication Protocol via Encrypted Key Ensuring Message Integrity

The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...

متن کامل

Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication

It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that ...

متن کامل

The Case for Quantum Key Distribution

Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of ...

متن کامل

Tight Finite Key Scheme for Quantum Key Distribution (qkd) Protocol to Authenticate Multi- Party System in Cloud Infrastructure

Confidentiality, integrity and authentication are the key concerns in this cloud infrastructure. The aim of this research is to introduce a new tight finite key scheme for authentication process in order to establish a connection between legitimate users in cloud infrastructure. In this case we are using quantum channel and also quantum key distribution (QKD) protocol to replace the existing co...

متن کامل

Quantum Authenticated Key Distribution

Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999