Quantum Nonlocality Protecting Secure Direct Communication Against Denial-of-Service Attack
نویسنده
چکیده
We present a secure communication protocol which allows direct secure communication. Using quantum nonlocality, information is transferred in a deterministic manner. The security of this protocol is based on the ‘High fidelity implies low entropy’. In fact, the eavesdropper-Eve can use a denial-of-service (DoS) attack to destroy a quantum communication,e.g., she can destroy the travel photon to stop a communication. But our protocol can protect communication against the DoS attack in theory.
منابع مشابه
Quantum Nonlocallity Protecting the Secure Direct Communication Against Destroying-Travel-Qubit-Type Attack
We present a real one-time-pad key communication protocol that allows the secure direct communication. With the quantum nonlocality, Alice and Bob (the communicators) can send message to each other in a deterministic manner by using local operations and a reliable public channel. The security of this protocol is based on the ‘High fidelity implies low entropy’. Actually, the eavesdropper-Eve ca...
متن کاملMitigating Denial Of Services Using Secure Overlay Service Model
Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This leaves the door open for other attacks that use more sophisticated methods to m...
متن کاملClassical Authenticated Key Exchange and Quantum Cryptography
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these no...
متن کاملSTONe: Secure Trusted Overlay Networks for Robust Privacy-Protecting Communication
This paper presents STONe, Secure Trusted Overlay Network, a novel robust network infrastructure that provides privacypreserving communication. STONe is the first network architecture based on attestation and strong process isolation in Trusted Computing. Using these features to protect the network stack against Byzantine failures, STONe is able to establish different protection techniques agai...
متن کاملPost-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the quantum random oracle model. Our scheme is a combination of an asymmetric and a symmetric encryption scheme that are secure in a weak sense. It is a slight modification of the Fujisaki-Okamoto transform that is secure against classical adversaries. In addition, we modify the OAEP-cryptosystem and prove ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003