عنوان المقالة:Reducing the Authentication Cost in Quantum Cryptography
عمرعبدالكريم جاسم محمد | Omer K. Jasim Mohammed | 1191
- نوع النشر
- مؤتمر علمي
- المؤلفون بالعربي
- 12th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting
- الملخص العربي
- Quantum cryptography utilizes quantum phenomena such as the no-cloning theorem and the Heisenberg uncertainty principle to achieve the goal of secure communication over quantum channels. The object of a Quantum Key Distribution (QKD) protocol is to enable Alice and Bob to securely distribute session keys that can be used for securing further communication. Many QKD protocols have been proposed in the literature. Originally, QKD protocols assume that all communicating parties had been well authenticated before the protocol execution. In other words, without this assumption, these protocols are vulnerable to "Man-in-the-middle" attacks.
- تاريخ النشر
- 05/06/2011
- الناشر
- PGNet 2011, UK
- رابط خارجي
- http://www.techrepublic.com/resource-library/whitepapers/reducing-the-authentication-cost-in-quantum-cryptography/
- الكلمات المفتاحية
- Authentication codes; Authentication cost; Key Distribution; Quantum Cryptography; Universal Hashing