Integrated Classical and Quantum Cryptography Scheme Using Three Party Authenticated Key Distribution Protocols

被引:2
|
作者
Renuka, D. [1 ]
Reddy, P. Chenna [2 ]
机构
[1] JNTUACE, Dept Comp Sci & Engn, Pulivendla, Andhra Pradesh, India
[2] JNTUniv, CSE Dept, Ananthapuramu, Andhra Pradesh, India
关键词
Classical Cryptography; Quantum Cryptography; Three-party authenticated key distribution protocols; Provable security; passive attack; digital signatures; communicaton rounds;
D O I
10.1016/j.matpr.2017.11.178
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Now a day's Cryptography is most widely used technique for providing security. Classical Cryptography and Quantum Cryptography are two techniques that are widely used. Digital signatures provides best authentication in Classical cryptography. Quantum cryptography provides photons and polarization (these are quantum mechanical properties) for best security. By combining both, we can provide best authentication and security and also number of communication rounds can be reduced. Passive attacks cannot be solved by classical cryptography and large number of rounds of communication is another major problem. Eaves dropping can be eliminated with quantum channel and reduce the number of rounds for communication. But in quantum cryptography digital signatures are difficult to use, and it has distance limitation. This paper presents security and authentication by using Three Party Authentication Scheme i.e., three parties are involved. Implicit User Authentication and Explicit Mutual Authentications are used previously for providing authentication. In this paper digital signatures add to explicit mutual authentication to show new combination. This paper has the objective to solve authentication problem and also provide solutions to attacks such as man-in-the middle attacks, eaves dropping, and replay attacks. (c) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1017 / 1023
页数:7
相关论文
共 50 条
  • [1] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [2] Secure Communication Using Two Party Authenticated Quantum key Distribution Protocols
    Venkatramulu, S.
    Veena, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 233 - 238
  • [3] A practical protocol for three-party authenticated quantum key distribution
    D. J. Guan
    Yuan-Jiun Wang
    E. S. Zhuang
    Quantum Information Processing, 2014, 13 : 2355 - 2374
  • [4] A practical protocol for three-party authenticated quantum key distribution
    Guan, D. J.
    Wang, Yuan-Jiun
    Zhuang, E. S.
    QUANTUM INFORMATION PROCESSING, 2014, 13 (11) : 2355 - 2374
  • [5] Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
    Kanamori, Yoshito
    Hoanca, Bogdan
    Yoo, Seong-Moo
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] Quantum Cryptography and Quantum Key Distribution Protocols: A Survey
    Padmavathi, V.
    Vardhan, B. Vishnu
    Krishna, A. V. N.
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 556 - 562
  • [7] QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS
    Gumus, Ergun
    Aydin, G. Zeynep
    Aydin, M. Ali
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2008, 8 (01): : 503 - 510
  • [8] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [9] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [10] A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography
    Chaudhary, Dharminder
    Kumar, Uddeshaya
    Saleem, Kashif
    IEEE ACCESS, 2023, 11 : 136947 - 136957