An enhanced quantum key distribution protocol for security authentication

被引:81
|
作者
Kumar, Ankit [1 ]
Dadheech, Pankaj [1 ]
Singh, Vijander [2 ]
Raja, Linesh [2 ]
Poonia, Ramesh C. [2 ]
机构
[1] Swami Keshvanand Inst Technol Management & Gramot, Dept Comp Sci & Engn, Jaipur 302017, Rajasthan, India
[2] Amity Univ, Amity Inst Informat Technol, Jaipur 303002, Rajasthan, India
关键词
Quantum Cryptography; Security Attack; Authentication; Message Verification;
D O I
10.1080/09720529.2019.1637154
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum cryptography promises to provide sophisticated functionality for security issues but it also leads to unbelievable increment in computational parallelism which is helpful for potential cryptanalytic attacks. Some of the associated properties of Quantum Key Distribution protocol that provide security that is deficient for the shared key to be transmitted securely. The identity verification process attempts to maximize success in interpreting the EPR protocol for distribution of Quantum.
引用
收藏
页码:499 / 507
页数:9
相关论文
共 50 条
  • [41] AN SECURITY-ENHANCED AUTHENTICATION AND KEY AGREEMENT PROTOCOL FOR NEXT GENERATION MOBILE COMMUNICATION SYSTEM
    Li, Xiehua
    Xu, Mingsong
    Cao, Jihong
    Zhang, Haiyang
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 247 - 250
  • [42] Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol
    Ghilen A.
    Azizi M.
    International Journal of Information and Communication Technology, 2019, 14 (03) : 277 - 294
  • [43] Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
    Dong Y.-D.
    Peng J.-Y.
    Zhang X.-B.
    Zhang Z.-L.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 151 - 156
  • [44] Modeling optimized decoy state protocol for enhanced quantum key distribution
    Lopes, Minal
    Sarwade, Nisha
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 1 - 7
  • [45] Security of a control key in quantum key distribution
    Rehman, Junaid Ur
    Qaisar, Saad
    Jeong, Youngmin
    Shin, Hyundong
    MODERN PHYSICS LETTERS B, 2017, 31 (11):
  • [46] Advancing quantum communication security: Metamaterial based quantum key distribution with enhanced protocols
    Biswas, Sujit
    Goswami, Rajat S.
    Reddy, K. Hemant Kumar
    Mohanty, Sachi Nandan
    Ahmed, Mohammed Altaf
    IET QUANTUM COMMUNICATION, 2024, : 399 - 416
  • [47] Security aspects of the authentication used in quantum key growing
    Cederlof, Jorgen
    Larsson, Jan-Ake
    ADVANCED FREE-SPACE OPTICAL COMMUNICATION TECHNIQUES/APPLICATIONS II AND PHOTONIC COMPONENTS ARCHITECTURES FOR MICROWAVE SYSTEMS AND DISPLAYS, 2006, 6399
  • [48] Security of six-state quantum key distribution protocol with threshold detectors
    Kato, Go
    Tamaki, Kiyoshi
    SCIENTIFIC REPORTS, 2016, 6
  • [49] Quantum Key Distribution with Error Rejecting Protocol: Optical Setup and Security Analysis
    Nascimento, Jose C.
    Mendonca, Fabio A.
    Giraudo, Elvio C.
    Ramos, Rubens V.
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 668 - 671
  • [50] Effect of pseudo-random number on the security of quantum key distribution protocol
    Yang, Xiao-Liang
    Li, Yu-Qing
    Li, Hong-Wei
    CHINESE PHYSICS B, 2025, 34 (02)