An enhanced quantum key distribution protocol for security authentication

被引:81
|
作者
Kumar, Ankit [1 ]
Dadheech, Pankaj [1 ]
Singh, Vijander [2 ]
Raja, Linesh [2 ]
Poonia, Ramesh C. [2 ]
机构
[1] Swami Keshvanand Inst Technol Management & Gramot, Dept Comp Sci & Engn, Jaipur 302017, Rajasthan, India
[2] Amity Univ, Amity Inst Informat Technol, Jaipur 303002, Rajasthan, India
关键词
Quantum Cryptography; Security Attack; Authentication; Message Verification;
D O I
10.1080/09720529.2019.1637154
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum cryptography promises to provide sophisticated functionality for security issues but it also leads to unbelievable increment in computational parallelism which is helpful for potential cryptanalytic attacks. Some of the associated properties of Quantum Key Distribution protocol that provide security that is deficient for the shared key to be transmitted securely. The identity verification process attempts to maximize success in interpreting the EPR protocol for distribution of Quantum.
引用
收藏
页码:499 / 507
页数:9
相关论文
共 50 条
  • [31] Unconditional security of a K-state quantum key distribution protocol
    Dariusz Kurzyk
    Łukasz Pawela
    Zbigniew Puchała
    Quantum Information Processing, 2018, 17
  • [32] Unconditional security of a K-state quantum key distribution protocol
    Kurzyk, Dariusz
    Pawela, Lukasz
    Puchala, Zbigniew
    QUANTUM INFORMATION PROCESSING, 2018, 17 (09)
  • [33] Resilient Group Key Agreement Protocol with Authentication Security
    Rajaram, M.
    Thilagavathy, D.
    Devi, N. Kanjana
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGIES (ICICT), 2010,
  • [34] Security of Quantum Key Distribution
    Beaudry, Normand
    Ferenczi, Agnes
    Narasimhachar, Varun
    Moroder, Tobias
    Ma, Xiongfeng
    Piani, Marco
    Luekenhaus, Norbert
    2010 CONFERENCE ON OPTICAL FIBER COMMUNICATION OFC COLLOCATED NATIONAL FIBER OPTIC ENGINEERS CONFERENCE OFC-NFOEC, 2010,
  • [35] Security of quantum key distribution
    Renner, Renato
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (01) : 1 - 127
  • [36] Authentication and key distribution protocol in UPT system
    Zhu, Yujun
    Lin, Xiaodong
    Liao, Jianxin
    Chen, Junliang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1999, 27 (07): : 51 - 54
  • [37] Security of Quantum Key Distribution
    Yuen, Horace P.
    IEEE ACCESS, 2016, 4 : 724 - 749
  • [38] Weaknesses in EHA authentication and key distribution protocol
    Stanek, M
    Olejár, D
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 87 - 95
  • [39] Enhanced Security of Software-defined Network and Network Slice Through Hybrid Quantum Key Distribution Protocol
    Mahdi, Suadad S.
    Abdullah, Alharith A.
    INFOCOMMUNICATIONS JOURNAL, 2022, 14 (03): : 9 - 15
  • [40] Multi-level authentication for security in cloud using improved quantum key distribution
    Kumar, Ashutosh
    Verma, Garima
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,