Quantum Authenticated Key Distribution
نویسندگان
چکیده
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for quantum key distribution that does authentication by quantum means only. Although a classical channel is still used, there is no need for the channel to be authenticated. The algorithm relies on two protected public keys to authenticate the communication partner.
منابع مشابه
Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant
Since quantum computers came on the scene, the world has changed greatly, especially related to cryptography. Public key cryptosystem, particularly RSA cryptosystem cant resist the quantum computers attack, so some quantum-resistant schemes have been proposed mainly based on quantum key distribution (QKD) method or new resistance to quantum algorithms. However, to the best of our knowledge, no ...
متن کاملQuantum Key Distribution in the Classical Authenticated Key Exchange Framework
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational dis...
متن کاملInformation theoretically secure distributed storage system with quantum key distribution network and password authenticated secret sharing scheme
Information theoretically secure distributed storage system with quantum key distribution network and password authenticated secret sharing scheme M. Fujiwara1*, A. Waseda1, R. Nojima1, S. Moriai1, W. Ogata2 and M. Sasaki1 1National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-kita, Koganei, Tokyo 184-8795, Japan 2Tokyo Institute of Technology, 2-12-1 Ookayama, Meg...
متن کاملClassical Authenticated Key Exchange and Quantum Cryptography
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these no...
متن کاملUnconditionally Secure Multipartite Quantum Key Distribution
We consider the problem of secure key distribution among n trustful agents: the goal is to distribute an identical random bit-string among the n agents over a noisy channel such that eavesdroppers learn little about it. We study the general situation where the only resources required are secure bipartite key distribution and authenticated classical communication. Accordingly, multipartite quant...
متن کامل