On quantum authentication protocols

被引:0
|
作者
Kanamori, Y [1 ]
Yoo, SM [1 ]
Gregory, DA [1 ]
Sheldon, FT [1 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
authentication; encryption; photon; polarization; quantum crytography; superposition states;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have computational power enough to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. We propose an authentication protocol using quantum superposition states instead of quantum entangled particles. Our protocol can be implemented with the current technologies we introduce in this paper.
引用
收藏
页码:1650 / 1654
页数:5
相关论文
共 50 条
  • [31] Attacks on Recent RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
  • [32] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [33] A Syntactic Criterion for Injectivity of Authentication Protocols
    Cremers, C. J. F.
    Mauw, S.
    de Vink, E. P.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 135 (01) : 23 - 38
  • [34] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [35] Serverless search and authentication protocols for RFID
    Tan, Chiu C.
    Sheng, Bo
    Li, Qun
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
  • [36] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [37] A Novel Approaches for Visual Authentication Protocols
    Mane, Priyanka
    Desale, Poonam
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 182 - 184
  • [38] Formalising theories of trust for authentication protocols
    Ma, Ji
    Orgun, Mehmet A.
    INFORMATION SYSTEMS FRONTIERS, 2008, 10 (01) : 19 - 32
  • [39] Cryptanalysis of a suite of deniable authentication protocols
    Zhu, Robert W.
    Wong, Duncan S.
    Lee, Chan H.
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (06) : 504 - 506
  • [40] Biometric Authentication Protocols on Smartphones - An Overview
    Stokkenes, Martin
    Ramachandra, Raghavendra
    Busch, Christoph
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 135 - 139