A Quantum Cryptographic Protocal with Detection of Compromised Server

نویسندگان

  • D. RICHARD KUHN
  • H Zbinden
چکیده

This paper presents a server-based hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. A novel feature of the protocol is that it can detect a compromised server. Additional advantages are that it avoids the requirement for timestamps used in classical protocols, guarantees that the trusted server cannot know the authentication key, can provide resistance to multiple photon attacks, and can be used with BB84 or other quantum key distribution protocols. Each resource shares a previously distributed secret key with the trusted server, and resources can communicate with the server using both classical and quantum channels. Resources do not share secret keys with each other, so that the key distribution problem for the network is

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A quantum cryptographic protocol with detection of compromised server

This paper presents a server-based hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. A novel feature of the protocol is that it can detect a compromised server. Additional advantages are that it avoids the requirement for timestamps used in classical protocols, guarantees that the trusted server...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Password - Only Authenticated Key Exchange Using Distributed Server

Authentication using Passwordauthenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key exchange of messages. Database of all passwords to authenticate clients are stored in a distributed server. If the server is compromised, the attacker cannot act like a client with the information from the compromised server. Solution produced for distributed-server PAKE ...

متن کامل

Towards a Mechanization of Cryptographic Protocal Verification

We revisit the approach deened in 2] for the formal veriication of cryptographic protocols so as to allow for some mechanization in the veriication process. In the original approach veriication uses theorem proving. Here we show that for a wide range of practical situations and properties it is possible to perform the veriication on a nite and safe abstract model.

متن کامل

Secret Key Generation and Eavesdropping detection using Quantum Cryptography

Quantum Cryptography is based upon the use of quantum effects and extends those effects for conventional cryptographic methods. The two major advantages of quantum cryptography over conventional cryptography are true random secret key generation and eavesdropping detection. Quantum cryptography has been developed which promises more secure communication than any existing technique and cannot be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003