This document proposes two new quantum key distribution protocols (QKDPs) that improve security and efficiency. The protocols provide implicit or explicit authentication between three parties. They increase security against attacks while reducing the number of communication rounds, allowing parties to share long-term secrets. The document also introduces a new "Unbiased-Chosen Basis" assumption to prove the security of the proposed schemes.
This document proposes two new quantum key distribution protocols (QKDPs) that improve security and efficiency. The protocols provide implicit or explicit authentication between three parties. They increase security against attacks while reducing the number of communication rounds, allowing parties to share long-term secrets. The document also introduces a new "Unbiased-Chosen Basis" assumption to prove the security of the proposed schemes.
This document proposes two new quantum key distribution protocols (QKDPs) that improve security and efficiency. The protocols provide implicit or explicit authentication between three parties. They increase security against attacks while reducing the number of communication rounds, allowing parties to share long-term secrets. The document also introduces a new "Unbiased-Chosen Basis" assumption to prove the security of the proposed schemes.
This document proposes two new quantum key distribution protocols (QKDPs) that improve security and efficiency. The protocols provide implicit or explicit authentication between three parties. They increase security against attacks while reducing the number of communication rounds, allowing parties to share long-term secrets. The document also introduces a new "Unbiased-Chosen Basis" assumption to prove the security of the proposed schemes.
Download as DOC, PDF, TXT or read online from Scribd
Download as doc, pdf, or txt
You are on page 1of 2
Secure Transmission Using Trusted Protocols
ABSTRACT
This work presents quantum key distribution protocols (QKDPs) to safeguard
security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) Security against such attacks as man-in-the-middle, eavesdropping and replay. 2) Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs. 3) Two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption. In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. However, public discussions require additional communication rounds between a sender and receiver and cost precious quits. By contrast, classical cryptography provides convenient techniques that enable efficient key verification and user authentication. SYSTEM REQUIREMENTS
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging