2005
DOI: 10.1142/s0219749905000797
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the Middle Attack in Quantum Cryptography

Abstract: In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
35
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 28 publications
(37 citation statements)
references
References 8 publications
2
35
0
Order By: Relevance
“…In doing so Eve manages to modify her respective protocol messages such that these collide with those of Alice and Bob under the first part of the authentication of Ref. [24]. Depending on the protocol variants (e.g., immediate vs. delayed authentication), the different attacks which we study address sifting, error correction, confirmation, and privacy amplification or only some of these steps.…”
Section: New Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In doing so Eve manages to modify her respective protocol messages such that these collide with those of Alice and Bob under the first part of the authentication of Ref. [24]. Depending on the protocol variants (e.g., immediate vs. delayed authentication), the different attacks which we study address sifting, error correction, confirmation, and privacy amplification or only some of these steps.…”
Section: New Resultsmentioning
confidence: 99%
“…The non-ITS authentication mechanism of Ref. [24] The authentication mechanism proposed in Ref. [24] aimed to consume less key than ASU 2 authentication.…”
Section: 3mentioning
confidence: 99%
“…For details on the integration of QKD in security infrastructures, the reader is kindly advised to refer to [23] and [24], for example.  Hybrid PKI-based approach: There are some researchers (See for example [25]) who think that properly combining QKD with public-key based authentication can also provide working environment with enhanced properties. Such hybrid schemes are easier for implementation than pure QKD systems.…”
Section: Presentation Tiermentioning
confidence: 99%
“…13, 14 However, it was still possible to close these breaches by relatively straightforward countermeasures in the definitions of the protocols. 1,15 The security of the standard and/or hardened protocols remained an open issue but it appeared plausible that adequately designed protocols remain unaffected.…”
Section: Security Of the "Ijqi-3-225" Authenticationmentioning
confidence: 99%
“…Alice and Bob never come to realize that the security of their communication is completely lost (see Ref. 1 and references therein for further details).…”
Section: Introductionmentioning
confidence: 99%