عنوان المقالة:Reducing the Authentication Cost in Quantum Cryptography
عمرعبدالكريم جاسم محمد | Omer K. Jasim Mohammed | 1191
نوع النشر
مؤتمر علمي
المؤلفون بالعربي
12th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting
الملخص العربي
Quantum cryptography utilizes quantum phenomena such as the no-cloning theorem and the Heisenberg uncertainty principle to achieve the goal of secure communication over quantum channels. The object of a Quantum Key Distribution (QKD) protocol is to enable Alice and Bob to securely distribute session keys that can be used for securing further communication. Many QKD protocols have been proposed in the literature. Originally, QKD protocols assume that all communicating parties had been well authenticated before the protocol execution. In other words, without this assumption, these protocols are vulnerable to "Man-in-the-middle" attacks.
تاريخ النشر
05/06/2011
الناشر
PGNet 2011, UK
رابط خارجي
http://www.techrepublic.com/resource-library/whitepapers/reducing-the-authentication-cost-in-quantum-cryptography/
الكلمات المفتاحية
Authentication codes; Authentication cost; Key Distribution; Quantum Cryptography; Universal Hashing
رجوع