On quantum authentication protocols

被引:0
|
作者
Kanamori, Y [1 ]
Yoo, SM [1 ]
Gregory, DA [1 ]
Sheldon, FT [1 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
authentication; encryption; photon; polarization; quantum crytography; superposition states;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have computational power enough to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. We propose an authentication protocol using quantum superposition states instead of quantum entangled particles. Our protocol can be implemented with the current technologies we introduce in this paper.
引用
收藏
页码:1650 / 1654
页数:5
相关论文
共 50 条
  • [41] Authentication protocols for microcontroller smart cards
    Weikmann, Franz
    AEU-Archiv fur Elektronik und Ubertragungstechnik, 1999, 53 (04): : 222 - 226
  • [42] Classification of authentication protocols: A practical approach
    Park, D
    Boyd, C
    Dawson, E
    INFORMATION SECURITY, PROCEEDINGS, 2001, 1975 : 194 - 208
  • [43] Security of lightweight mutual authentication protocols
    Tu, Yu-Ju
    Kapoor, Gaurav
    Piramuthu, Selwyn
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4565 - 4581
  • [44] SMAPs: Short Message Authentication Protocols
    Baqer, Khaled
    Bezuidenhoudt, Johann
    Anderson, Ross
    Kuhn, Markus
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 119 - 132
  • [45] Weaknesses in Two RFID Authentication Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmnohammed, Mohamed
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 162 - 172
  • [46] An Approach for Formal Verification of Authentication Protocols
    Mironov, A. M.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2022, 43 (02) : 443 - 454
  • [47] ON THE FORMAL ANALYSIS OF PKCS AUTHENTICATION PROTOCOLS
    GAARDER, K
    SNEKKENES, E
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 106 - 121
  • [48] Efficient authentication for reactive routing protocols
    Bhaskar, Raghav
    Herranz, Javier
    Laguillaumie, Fabien
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 57 - +
  • [49] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    New Generation Computing, 2001, 19 : 283 - 299
  • [50] Secure Negotiation for Manual Authentication Protocols
    Milutinovic, Milica
    Peeters, Roel
    De Decker, Bart
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 214 - +