On quantum authentication protocols

被引:0
|
作者
Kanamori, Y [1 ]
Yoo, SM [1 ]
Gregory, DA [1 ]
Sheldon, FT [1 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
authentication; encryption; photon; polarization; quantum crytography; superposition states;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have computational power enough to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. We propose an authentication protocol using quantum superposition states instead of quantum entangled particles. Our protocol can be implemented with the current technologies we introduce in this paper.
引用
收藏
页码:1650 / 1654
页数:5
相关论文
共 50 条
  • [1] Classification of quantum authentication protocols and calculation of their complexity
    Ghilen, Aymen
    Belmabrouk, Hafedh
    Bouallegue, Ridha
    201415th International Conference on Sciences & Techniques of Automatic Control & Computer Engineering (STA'2014), 2014, : 169 - 173
  • [2] Distributed authentication systems enhanced by quantum protocols
    Kapczynski, Adrian
    Sobota, Marcin
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 928 - 931
  • [3] Challenges and Future Directions in the Implementation of Quantum Authentication Protocols
    McLeod, Juliet
    Majumdar, Ritajit
    Das, Sanchari
    COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 164 - 170
  • [4] Deniable authentication protocols
    Deng, X
    Lee, CH
    Zhu, H
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02): : 101 - 104
  • [5] Attacks on quantum key distribution protocols that employ non-ITS authentication
    Pacher, C.
    Abidin, A.
    Loruenser, T.
    Peev, M.
    Ursin, R.
    Zeilinger, A.
    Larsson, J. -A.
    QUANTUM INFORMATION PROCESSING, 2016, 15 (01) : 327 - 362
  • [6] Attacks on quantum key distribution protocols that employ non-ITS authentication
    C. Pacher
    A. Abidin
    T. Lorünser
    M. Peev
    R. Ursin
    A. Zeilinger
    J.-Å. Larsson
    Quantum Information Processing, 2016, 15 : 327 - 362
  • [7] Lightweight VANET Authentication Protocols
    Piramuthu, Otto B.
    Caesar, Matthew
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1975 - 1978
  • [8] Privacy and authentication protocols for PCS
    Mohan, S
    IEEE PERSONAL COMMUNICATIONS, 1996, 3 (05): : 34 - 38
  • [9] A bound on attacks on authentication protocols
    Stoller, SD
    FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
  • [10] Environmental requirements for authentication protocols
    Canetti, R
    Meadows, C
    Syverson, P
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 339 - 355