An enhanced quantum key distribution protocol for security authentication

被引:81
作者
Kumar, Ankit [1 ]
Dadheech, Pankaj [1 ]
Singh, Vijander [2 ]
Raja, Linesh [2 ]
Poonia, Ramesh C. [2 ]
机构
[1] Swami Keshvanand Inst Technol Management & Gramot, Dept Comp Sci & Engn, Jaipur 302017, Rajasthan, India
[2] Amity Univ, Amity Inst Informat Technol, Jaipur 303002, Rajasthan, India
关键词
Quantum Cryptography; Security Attack; Authentication; Message Verification;
D O I
10.1080/09720529.2019.1637154
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum cryptography promises to provide sophisticated functionality for security issues but it also leads to unbelievable increment in computational parallelism which is helpful for potential cryptanalytic attacks. Some of the associated properties of Quantum Key Distribution protocol that provide security that is deficient for the shared key to be transmitted securely. The identity verification process attempts to maximize success in interpreting the EPR protocol for distribution of Quantum.
引用
收藏
页码:499 / 507
页数:9
相关论文
共 13 条
  • [1] [Anonymous], 1 6 BOOKS HOMERS ILI
  • [2] [Anonymous], 2013, INT J RES DEV ENG IJ
  • [3] [Anonymous], B AM PHYS SOC
  • [4] [Anonymous], HOMER ILIAD 6 213
  • [5] [Anonymous], SHORT HIST CRYPTOGRA
  • [6] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
  • [7] An efficient approach for big data processing using spatial Boolean queries
    Dadheech, Pankaj
    Goyal, Dinesh
    Srivastava, Sumit
    Choudhary, C. M.
    [J]. JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04) : 583 - 591
  • [8] NEW KIND OF CIPHER THAT WOULD TAKE MILLIONS OF YEARS TO BREAK
    GARDNER, M
    [J]. SCIENTIFIC AMERICAN, 1977, 237 (02) : 120 - 124
  • [9] Kahn D., 1967, The Codebreakers: The Story of Secret Writing
  • [10] Kalra M, 2017, J INFORM OPTIM SCI, V38, P1047, DOI 10.1080/02522667.2017.1374723