Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/6689
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Faraj, Sufyan T. | - |
dc.date.accessioned | 2022-10-25T19:08:00Z | - |
dc.date.available | 2022-10-25T19:08:00Z | - |
dc.date.issued | 2007 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/6689 | - |
dc.description.abstract | Quantum key distribution (QKD) is a method using some properties of quantum mechanics to create a secret shared cryptographic key even if an eavesdropper has access to unlimited computational power. All QKD protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from this point of view, emphasizing the necessity and sufficiency of using unconditionally secure authentication in QKD. In this work, a new technique of using unconditionally secure authentication is proposed for quantum cryptosystems. This technique is based on a hybrid of normal application of authentication codes and the so-called “counter-based” authentication method such that to achieve a better trade off between security and efficiency (in terms of the required size of initially shared secret data). Based on this strategy, an authenticated version of a typical QKD protocol (the well-known BB84 protocol) is described. Some advantages of our protocol in comparison to other proposals are also highlighted. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Anbar Journal for Engineering Sciences | en_US |
dc.subject | Authentication | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Key Distribution | en_US |
dc.subject | Quantum | en_US |
dc.subject | Universal Hashing | en_US |
dc.title | Unconditionally Secure Authentication in Quantum Key Distribution | en_US |
dc.type | Article | en_US |
Appears in Collections: | قسم نظم المعلومات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
d4b7d1e45e2fdc2b.pdf | 297.5 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.