Integrated Classical and Quantum Cryptography Scheme Using Three Party Authenticated Key Distribution Protocols

被引:2
|
作者
Renuka, D. [1 ]
Reddy, P. Chenna [2 ]
机构
[1] JNTUACE, Dept Comp Sci & Engn, Pulivendla, Andhra Pradesh, India
[2] JNTUniv, CSE Dept, Ananthapuramu, Andhra Pradesh, India
关键词
Classical Cryptography; Quantum Cryptography; Three-party authenticated key distribution protocols; Provable security; passive attack; digital signatures; communicaton rounds;
D O I
10.1016/j.matpr.2017.11.178
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Now a day's Cryptography is most widely used technique for providing security. Classical Cryptography and Quantum Cryptography are two techniques that are widely used. Digital signatures provides best authentication in Classical cryptography. Quantum cryptography provides photons and polarization (these are quantum mechanical properties) for best security. By combining both, we can provide best authentication and security and also number of communication rounds can be reduced. Passive attacks cannot be solved by classical cryptography and large number of rounds of communication is another major problem. Eaves dropping can be eliminated with quantum channel and reduce the number of rounds for communication. But in quantum cryptography digital signatures are difficult to use, and it has distance limitation. This paper presents security and authentication by using Three Party Authentication Scheme i.e., three parties are involved. Implicit User Authentication and Explicit Mutual Authentications are used previously for providing authentication. In this paper digital signatures add to explicit mutual authentication to show new combination. This paper has the objective to solve authentication problem and also provide solutions to attacks such as man-in-the middle attacks, eaves dropping, and replay attacks. (c) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1017 / 1023
页数:7
相关论文
共 50 条
  • [21] Quantum deterministic key distribution protocols based on the authenticated entanglement channel
    Zhou, Nan-Run
    Wang, Li-Jun
    Ding, Jie
    Gong, Li-Hua
    PHYSICA SCRIPTA, 2010, 81 (04)
  • [22] Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
    Gao, Fei
    Qin, Su-Juan
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) : 630 - 635
  • [23] Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
    I-Cheng Liu
    Tzonelih Hwang
    Hsu-Chen Wei
    Quantum Information Processing, 22
  • [24] Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
    Liu, I-Cheng
    Hwang, Tzonelih
    Wei, Hsu-Chen
    QUANTUM INFORMATION PROCESSING, 2023, 22 (08)
  • [25] Robust biometric-based three-party authenticated key establishment protocols
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (06) : 1144 - 1157
  • [26] Token-based authenticated key establishment protocols for three-party communication
    Yoon, Eun-Jun
    Yoo, Kee-Young
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 758 - +
  • [28] SIGNIFICANCE OF KEY DISTRIBUTION USING QUANTUM CRYPTOGRAPHY
    Padmavathi, Vurubindi
    Vardhan, Bulusu Vishnu
    Krishna, Addepalli V. N.
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14 (01): : 371 - 377
  • [29] Quantum authenticated key distribution
    Nagy, Nava
    Akl, Selim G.
    UNCONVENTIONAL COMPUTATION, PROCEEDINGS, 2007, 4618 : 127 - +
  • [30] SECURE AND MINIMAL PROTOCOLS FOR AUTHENTICATED KEY DISTRIBUTION
    JANSON, P
    TSUDIK, G
    COMPUTER COMMUNICATIONS, 1995, 18 (09) : 645 - 653