Integrated Classical and Quantum Cryptography Scheme Using Three Party Authenticated Key Distribution Protocols

被引:2
|
作者
Renuka, D. [1 ]
Reddy, P. Chenna [2 ]
机构
[1] JNTUACE, Dept Comp Sci & Engn, Pulivendla, Andhra Pradesh, India
[2] JNTUniv, CSE Dept, Ananthapuramu, Andhra Pradesh, India
关键词
Classical Cryptography; Quantum Cryptography; Three-party authenticated key distribution protocols; Provable security; passive attack; digital signatures; communicaton rounds;
D O I
10.1016/j.matpr.2017.11.178
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Now a day's Cryptography is most widely used technique for providing security. Classical Cryptography and Quantum Cryptography are two techniques that are widely used. Digital signatures provides best authentication in Classical cryptography. Quantum cryptography provides photons and polarization (these are quantum mechanical properties) for best security. By combining both, we can provide best authentication and security and also number of communication rounds can be reduced. Passive attacks cannot be solved by classical cryptography and large number of rounds of communication is another major problem. Eaves dropping can be eliminated with quantum channel and reduce the number of rounds for communication. But in quantum cryptography digital signatures are difficult to use, and it has distance limitation. This paper presents security and authentication by using Three Party Authentication Scheme i.e., three parties are involved. Implicit User Authentication and Explicit Mutual Authentications are used previously for providing authentication. In this paper digital signatures add to explicit mutual authentication to show new combination. This paper has the objective to solve authentication problem and also provide solutions to attacks such as man-in-the middle attacks, eaves dropping, and replay attacks. (c) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1017 / 1023
页数:7
相关论文
共 50 条
  • [31] Secure and minimal protocols for authenticated key distribution
    IBM Zurich Research Lab, Ruschlikon, Switzerland
    Comput Commun, 9 (645-653):
  • [32] Lattice-Based Three Party Authenticated Key Agreement Scheme in Medical IoT for Post-Quantum Environment
    Ahmad, Arman
    Jagatheswari, S.
    IEEE ACCESS, 2024, 12 : 157247 - 157259
  • [33] Elliptic curve isogenies–based three-party password authenticated key agreement scheme towards quantum–resistant
    Zhu, Hongfeng (zhuhongfeng1978@163.com), 1600, Ubiquitous International (05):
  • [34] Certificateless authenticated two-party key agreement Protocols
    Mandt, Tarjei K.
    Tan, Chik How
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44
  • [35] Authenticated key agreement scheme with privacy-protection in the three-party setting
    Lin, J.-P. (jplin@mail.chihlee.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [36] A N-party authenticated group key distribution protocol using quantum-reflection architecture
    Zhu, Hongfeng
    Du, Zhiqin
    Wang, Liwei
    Zhang, Yuanle
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (3-4) : 237 - 253
  • [37] Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Wang, King-Hang
    Liu, Shuai
    Wu, Tsu-Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 679 - 687
  • [38] An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    Yang, Jen-Ho
    Chang, Chin-Chen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (09) : 1497 - 1502
  • [39] Experimental realization of three quantum key distribution protocols
    Warke, Aakash
    Behera, Bikash K.
    Panigrahi, Prasanta K.
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [40] Experimental realization of three quantum key distribution protocols
    Aakash Warke
    Bikash K. Behera
    Prasanta K. Panigrahi
    Quantum Information Processing, 2020, 19