Integrated Classical and Quantum Cryptography Scheme Using Three Party Authenticated Key Distribution Protocols

被引:2
|
作者
Renuka, D. [1 ]
Reddy, P. Chenna [2 ]
机构
[1] JNTUACE, Dept Comp Sci & Engn, Pulivendla, Andhra Pradesh, India
[2] JNTUniv, CSE Dept, Ananthapuramu, Andhra Pradesh, India
关键词
Classical Cryptography; Quantum Cryptography; Three-party authenticated key distribution protocols; Provable security; passive attack; digital signatures; communicaton rounds;
D O I
10.1016/j.matpr.2017.11.178
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Now a day's Cryptography is most widely used technique for providing security. Classical Cryptography and Quantum Cryptography are two techniques that are widely used. Digital signatures provides best authentication in Classical cryptography. Quantum cryptography provides photons and polarization (these are quantum mechanical properties) for best security. By combining both, we can provide best authentication and security and also number of communication rounds can be reduced. Passive attacks cannot be solved by classical cryptography and large number of rounds of communication is another major problem. Eaves dropping can be eliminated with quantum channel and reduce the number of rounds for communication. But in quantum cryptography digital signatures are difficult to use, and it has distance limitation. This paper presents security and authentication by using Three Party Authentication Scheme i.e., three parties are involved. Implicit User Authentication and Explicit Mutual Authentications are used previously for providing authentication. In this paper digital signatures add to explicit mutual authentication to show new combination. This paper has the objective to solve authentication problem and also provide solutions to attacks such as man-in-the middle attacks, eaves dropping, and replay attacks. (c) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1017 / 1023
页数:7
相关论文
共 50 条
  • [41] Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol
    Ghilen, Aymen
    Azizi, Mostafa
    Bouallegue, Ridha
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [42] Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
    Nimbhorkar, Sonali
    Malik, Latesh
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 824 - 830
  • [43] Analysis of Two Pairing-based Three-party Password Authenticated Key Exchange Protocols
    Phan, Raphael C. -W.
    Yau, Wei-Chuen
    Goi, Bok-Min
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 102 - +
  • [44] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Kim, Moonseong
    Paik, Juryon
    Won, Dongho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
  • [45] A Novel Authenticated Group Key Distribution Scheme
    Shi, Run-hua
    Zhong, Hong
    Zhang, Shun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 935 - 949
  • [46] A secure authenticated semi-quantum key distribution scheme for semi-quantum environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    QUANTUM INFORMATION PROCESSING, 2024, 23 (12)
  • [47] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115
  • [48] Quantum cryptography beyond quantum key distribution
    Broadbent, Anne
    Schaffner, Christian
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 78 (01) : 351 - 382
  • [49] Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    Shim, Kyung-Ah
    Woo, Sung Sik
    INFORMATION SCIENCES, 2007, 177 (04) : 1143 - 1151
  • [50] Quantum cryptography beyond quantum key distribution
    Anne Broadbent
    Christian Schaffner
    Designs, Codes and Cryptography, 2016, 78 : 351 - 382