Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems 2011
DOI: 10.1109/idaacs.2011.6072880
|View full text |Cite
|
Sign up to set email alerts
|

Application of quantum cryptography protocols in authentication process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Of course, one may need to slightly modify the original protocol of QKD to reduce it to a scheme for QIA. For example, such an effort was made in [89] where a scheme of QIA was obtained by slightly modifying BB84 protocol of QKD. Lately, a counterfactual QKD scheme was modified to propose a scheme for QIA in [76].…”
Section: Protocols Based On the Schemes For Qkdmentioning
confidence: 99%
“…Of course, one may need to slightly modify the original protocol of QKD to reduce it to a scheme for QIA. For example, such an effort was made in [89] where a scheme of QIA was obtained by slightly modifying BB84 protocol of QKD. Lately, a counterfactual QKD scheme was modified to propose a scheme for QIA in [76].…”
Section: Protocols Based On the Schemes For Qkdmentioning
confidence: 99%
“…It protects against attackers within the network where it can detect any eavesdropping attempt. It has been widely reported in literature that symmetric key distribution has several limitations due to its very design [5,6].…”
Section: Iirelated Workmentioning
confidence: 99%
“…3. Apply the unitary matrix as shown in equation (5) in parallel to represent the function as U_f=uf (f, m, n) where x is the bit string, m is the input, and n is the output bits. Function (f) should be in the form of f (x, n) and do unitary matrix from f. 4.…”
Section: Quantum Channel Stepsmentioning
confidence: 99%
“…Since the first QIA protocol [14] was proposed in 1995, quantum key distribution (QKD) and quantum entanglement have been widely used to design QIA protocols. Although the QKD-based protocol [15][16][17] can be easier implemented in reality, the limitations of the QKD protocol itself prevent further security improvements [18,19]. Quantum entanglement provides high security [20][21][22], multi-party authentication [23,24], and semi-quantum authentication [25,26] for some QIA protocols.…”
Section: Introductionmentioning
confidence: 99%