On quantum authentication protocols

被引:0
|
作者
Kanamori, Y [1 ]
Yoo, SM [1 ]
Gregory, DA [1 ]
Sheldon, FT [1 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
来源
GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE | 2005年
关键词
authentication; encryption; photon; polarization; quantum crytography; superposition states;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have computational power enough to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. We propose an authentication protocol using quantum superposition states instead of quantum entangled particles. Our protocol can be implemented with the current technologies we introduce in this paper.
引用
收藏
页码:1650 / 1654
页数:5
相关论文
共 50 条
  • [21] Study Of RFID Authentication Protocols
    Jadhao, A. G.
    Ugale, S. P.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [22] Compositional analysis of authentication protocols
    Bugliesi, M
    Focardi, R
    Maffei, M
    PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 140 - 154
  • [23] A Survey of Authentication Protocols in VANET
    Chen, Chin-Ling
    Chen, Yue-Xun
    Lee, Chin-Feng
    Deng, Yong-Yuan
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 572 - 577
  • [24] VERIFICATION AND MODELING OF AUTHENTICATION PROTOCOLS
    HAUSER, RC
    LEE, ES
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 141 - 154
  • [25] Replay tolerance of authentication protocols
    Lam, KY
    COMPUTER COMMUNICATIONS, 1995, 18 (12) : 988 - 992
  • [26] Errors in attacks on authentication protocols
    Hagalisletto, Anders Moen
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
  • [27] Verifying authentication protocols in CSP
    Schneider, S
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1998, 24 (09) : 741 - 758
  • [28] Authentication Protocols and Authentication on the Base of PKI and ID-based
    Min Thant
    Zaw, Than Myo
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [29] Two Semi-Quantum Direct Communication Protocols with Mutual Authentication Based on Bell States
    Zheng Tao
    Yan Chang
    Shibin Zhang
    Jinqiao Dai
    Xueyang Li
    International Journal of Theoretical Physics, 2019, 58 : 2986 - 2993
  • [30] Two Semi-Quantum Direct Communication Protocols with Mutual Authentication Based on Bell States
    Tao, Zheng
    Chang, Yan
    Zhang, Shibin
    Dai, Jinqiao
    Li, Xueyang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) : 2986 - 2993