Conference PaperPDF Available

Quantum Key Distribution by Using Public Key Algorithm(RSA)

Authors:

Abstract and Figures

Classical cryptography is based on the computational difficulty to compute the secret key using the current computing systems. Depending only on the difficulty of computational complexity does not provide enough security because finding a fast method to calculate the secret key will compromise the security of the systems. Quantum computing uses the law of physics for communication allowing new concepts to be applied in computing specially in cryptography and key distribution by applying quantum theorems and principles. In this paper, we are introducing a new model for quantum key distribution between three parties or more where there is a trusted center providing the clients the necessary secret information to securely communicate with each other.
Content may be subject to copyright.
Quantum Key Distribution by Using Public Key
Algorithm(RSA)
Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah
Department of Computer Science & Engineering
University of Bridgeport
Bridgeport, USA
{aodeh, elleithy, malshowk, eman} @bridgeport.edu
Abstract Classical cryptography is based on the
computational difficulty to compute the secret key using the
current computing systems. Depending only on the difficulty of
computational complexity does not provide enough security
because finding a fast method to calculate the secret key will
compromise the security of the systems. Quantum computing
uses the law of physics for communication allowing new
concepts to be applied in computing specially in cryptography
and key distribution by applying quantum theorems and
principles. In this paper, we are introducing a new model for
quantum key distribution between three parties or more where
there is a trusted center providing the clients the necessary
secret information to securely communicate with each other.
Keywords—Quantum Conputing, Three-party
Communication, Cryptography, Key Distribution;
I. INTRODUCTION
Quantum computing depends on quantum physics for
communication and quantum cryptography to secure the
communication between two parities. It allows two parities
to generate a key with special characteristics and use it for
secure communication between them. Quantum computing
allows the sender and the receiver to use two principles from
quantum mechanics. First, the Heisenberg uncertainty
principle and second, the no-cloning theorem [1]. These
principles provide the sender and the receiver absolute
security. In quantum computing the presence of an
eavesdropper who disturbs the communication can be
detected by the communicating parities. This property is
based on a concept in quantum mechanics which states that
measuring of a quantum state results in destroying that state.
An eavesdropper on the quantum channel could be detected
by superposition and entanglement [1-4]. Classical
cryptography doesn’t provide any properties to detect a third
party eavesdropping on the classical channel. No-cloning
theorem was proven in 1982 by Wootters and Zurek. It
states that a user cannot copy quantum channel state and
cannot duplicate the qubits without a prior knowledge of
their bases [2]. No-cloning principle makes it impossible
for an eavesdropper to listen to the quantum channel without
being detected unless this eavesdropper can perfectly predict
the sender random basis and use it to measure the qubits and
send them back to the receiver.
The rest of this paper is organized as follows. In Section II,
we briefly glance at the main security protocols over
quantum channel. In Section III, we describe our proposed
algorithm. Analysis of the proposed algorithm is presented
in Section IV. Finally, concluding remarks are offered in
Section V.
II. R
ELATED WORK
Quantum key distribution mainly depends on three
algorithms; BB84, B92, and EPR. Those protocols exchange
qubits over quantum channel and then apply probabilistic
measures to adjust the key bits sequence. BB84 uses
rectilinear and diagonal bases to pass data from sender to
receiver [5], [6]. The used bases are shown in equation (1)
B92 employs non-orthogonal bases to send qubits to the
receiving side [7], [8]. EPR uses one of the interesting
quantum properties which is entanglement to transfer data
between parties [9] . Two entangled states are shown in
equation (2).
{| |} =
1,0
T
,
1,1
T
1
|00 |11
2
2
The first concept of quantum key exchange was introduced
by Bennett and Brassard in 1984 [10]. The implementation
results in IBM laboratory of the first quantum cryptography
experiment were impressive and showed that quantum
cryptography is promising for secret key exchange [11]. The
uncertainty principle was applied in this experiment instead
mathematical modeling.
In [11], new principles were introduced for secret key
exchange against two types of intruders who intercept and
resend data. Figure 2 shows the main idea in reconciliation
between sender and receiver.
Figure 1.Rectilinear
Base
Figure 2.Diagonal
Base
978-1-4799-0048-0/13/$31.00 ©2013 IEEE
83
Figure 3. Reconciliation for Practical Quantum Key
In [12], the authors presented new security algorithm to
distribute a key over the quantum channel. In this algorithm
it is assumed that two quantum channels between the sender
and the receiver while using diagonal bases {, } and
rectilinear bases {,}. The sender sends the same data
using two channels. The receiver measures the first
channel’s data using diagonal basis and uses rectilinear basis
for the second channel. By measuring both channels, the
receiver cancels any measured bit that has a probability less
than 1. It keeps the remaining certain bits with a probability
of 1. By this strategy the parties agree on the quantum bases
order that are used to transmit the data.
In [12], two protocols were introduced by using three party
quantum key distributions. The proposed work achieves
session agreement by using only unitary operation. In other
words, QKD is trusted from all parties, where the sender
uses some classical concepts such as checksum, and then
adds the checksum result to the original message. The main
advantage of this algorithm is that it allows authorized users
to use qubits as a session key.
A proposal introduced in [13] that supports security over
direct communications in addition to improving
authentication. The trusted server manages the
communication between authenticated users. To improve
security, the communication is divided into two stages. The
first part is called authentication and attackers check stage.
It employs hash function and unitary matrix property to
improve data authentication where each user has a unique
ID over the network. In the second stage, direct
communication occurs by dividing the data into blocks and
using entangled bits.
In [14], the authors presented a new proposal that merges
between the merits of classical cryptography and quantum
cryptography using Quantum Key Distribution Protocol
(QKDP). QKDP consists of two phases; the first step is
connection setup where the sender and the receiver agree
about the bases that can be used during the connection. The
next step is key distribution where the trusted center (TC)
notifies users about communication process. In the
beginning, TC generates a random number and a session key
by employing hashing function then sends them to the
authenticated users. When the users receive the qubits, they
measure the qubits by using the established bases from the
first phase and verify the result to check if it is the key they
agreed on or not. After the verification steps, the sender
starts sending data.
In [15], a secure algorithm introduced to improve the data
confidentiality and user authentication by using multi-party
applications. A Multicast Network Security model divides
the process into three phases. The first one is user
authentication where only legitimate users can receive
messages. In the second phase, Quantum key distribution
generates secure keys to encrypt and decrypt messages. In
the last phase, the data can be encrypted by using generated
keys from the second phase and then send to legitimate
users.
Quantum Key Distribution (QKD) protocol with a two-way
quantum channel was introduced in [16]. The algorithm
works by sending data more than once between the users
and they will compute the Quantum Bit Error Rate (QBER).
This algorithm consists of 10 steps and those steps are
repeated for 20 rounds. After the rounds, a shifted key
process is applied to agree on the bases that will be used
between the users.
In [17], Sarath et. al. proposed a scheme for digital
authentication using hash function. The scheme is utilizing
quantum characteristics and principles to perform one way
hash function. The authors proposed the scheme as an
improvement to the protocol BB84 which supports
authentication by considering programming polarizer. Dual
quantum channels are required in the scheme. The protocol
has a combination of quantum and classical processes that
provide high degree of security.
III. P
ROPOSED ALGORITHM
In this paper, we propose a three-party key distribution
protocol. Alice and Bob want to securely communicate with
each other and require a secret key to secure their
communicating channel from a trusted third party. In
protocols such as BB84 and B92, the sender and the receiver
are not able to know the secret key until the last step when
they finish the comparison of their bases. When a third party
is introduced, BB84 and B92 cannot be applied because
there is no mechanism to precisely distribute the same key
to multiple parties.
In our proposed protocol we are considering how to involve
three or more parties in the key distribution process. Our
specific aim is to improve key distribution system by
applying some classical concepts and quantum techniques.
By applying public key concepts, we can enhance user
authentication and data integrity process. The proposed
algorithm achieves a high percentage of the correct bases.
Moreover, we don’t need the physical channel to check the
Qubits sequence where the quantum bases are shared by
using asymmetric key distribution center. The proposed
algorithm consists of two phases:
1. User Authentication & Quantum Bases distribution
2. Data Transfer over the Quantum channel
In order for Alice and Bob to obtain a session key, the
following steps take place between the three parties:
84
User Authentication and Quantum Bases distribution
1- Alice requests to have a connection with Bob
Alice
J
QKD: E
PR-Alice
(ID
Alice
|| ID
Bob
)
QKD will register the connection request status in log file
and check the ID of Alice for user Authentication.
Moreover, QKD checks Bob’s ID status (Busy, Free). If Bob
is free, QKD moves to step 2.
2- QKD sends to Bob a connection request containing
Alice’s request
QKD
J
Bob: E
PU-Bob
(ID
Alice
|| ID
Bob
)
3- When Bob reply by accepting the connection with Alice,
Bob will send to QKD a confirmation message
Bob
J
QKD: E
PR-Bob
(ID
Alice
|| ID
Bob
)
QKD decrypts the message and adds connection’s status
between Alice and Bob and both of them are authenticated
to send and receive data.
4- QKD starts distributing quantum bases (+,X) in some
sequence to encode the message to Alice and Bob in an
encrypted message using their public keys.
4. 1 QKD
J
Alice: E
PU-Alice
(ID
Alice
|| ID
Bob
|| QB).
4. 2 QKD
J
Bob: E
PU-Bob
(ID
Alice
|| ID
Bob
|| QB).
Data Transfer over Quantum channel
5- After Alice and Bob receive the quantum bases from
QKD, Alice sends an encrypted message using the quantum
bases to Bob
Alice
J
Bob: E
PR-Alice
(E
QB
(M)||E
PU-Bob
(ID
Alice
))
6- Bob and Alice send a random part of the message to
QKD by using Private Key of sender(Alice, Bob).
Bob QKD: E
PR-Bob
(E
QB
(M)||E
PU-QKD
(ID
Bob
))
Alice QKD: E
PR-Alice
(E
QB
(M)||E
PU-QKD
(ID
Alice
))
QKD can decrypt the messages and compare between them.
If there are any
mismatching bits, then QKD concludes
that there is an intruder.
7- QKD sends notification messages to Alice and Bob to
inform them there is an intruder or not.
QKD
J
Bob: E
PU-Bob
(E
QB
(Notify))
QKD
J
Alice: E
PU-Alice
(E
QB
(Notify))
Figure 4 and Figure 5 show the steps involved in the
algorithm.
2
. E
PUBob
(ID
Alic
e
||
I
D
Bo
b
)
4
. E
PUBob
(ID
Alic
e
||ID
Bob
||QB)
3. E
P
R
Bob
(
I
D
Ali
ce
||
ID
Bob
)
1. E
PRAlice
(
I
D
Alic
e
||
ID
Bob
)
4.
E
PU
Alic
e
(ID
A
lic
e
|| ID
Bo
b
|| QB)
Figure 4.User Authentication and Quantum Bases distribution
If the Notify message is Okay, the connection will be alive
until QKD sends any error notification or Alice stops
sending. In the proposed protocol, we improve security
over the quantum channel. Each message is authenticated by
the sender using its private key. Moreover, data
authentication enhancement is achieved when parties send
random pieces to QKD center and notify them. By applying
this protocol we remove the guessing theory applied in early
protocols such as BB84, B92, and EPR. We have improved
the ability to identify if there is an intruder or not.
IV.
ALGORITHM ANALYSIS
Our proposed algorithm consists of two general phases and
seven steps. In this section we analyze our algorithm and
compare it with other algorithms. Table I shows a
comparison with respect to used bases, classical channel and
user Authentication. Table II, illustrates a comparison in
regards to number of used phases and the use of
cryptography.
In protocols BB84, B92 and EPR there is a probability of
mismatching bases. Taking into consideration this
possibility, the length of bases will be relatively smaller to
the original length. If there is an attacker, the percent will be
50%, which means that half of key will be discarded. In our
protocol, we can transfer the message by using the whole
key length. By using public key encryption algorithm, we
can send the quantum bases sequence from QKD to Alice
and Bob. In addition, we improve user’s authentication
where the above three algorithms do not provide it.
On the other hand, earlier protocols use classical channel to
compare between the sender and the receiver bases. In our
algorithm, the sender and the receiver send random parts
from the message to QKD to check if there is an intruder or
not.
V. C
ONCLUSION
Quantum key distribution protocols BB84, B92 and EPR
communicate using a classical channel to compare the
bases. This approach facilitates eliminating the erroneous
qubits. In this paper we introduce a novel security quantum
algorithm that employs public key encryption algorithm to
85
generate keys to improve security over quantum
communication channel. Moreover, the introduced
algorithm enhances user’s authentication and data privacy.
P
R
B
o
b
Q
B
P
U
Q
K
D
B
o
b
P
R
-
A
l
i
c
e
Q
B
P
U
-
Q
K
D
A
l
i
c
e
P
U
-
B
o
b
Q
B
P
U
-
A
l
i
c
e
Q
B
Figure 5.Data Transfer over Quantum channel
Table I. Compression between QKD, BB82, B92 and EPR
Algorithm Bases
Classical
Channel
User
Authentication
BB82 +,X Yes No
B92
Non-
orthogonal
Yes No
EPR
Entanglement
Bit
Yes No
Our Algorithm +,X No Yes
Table II. Comparison between QDKP and other protocols
Algorithm No. of phase
Classical
cryptography
[15] Two phases Hashing function
[16] Three phases XOR classical Gate
[17] One Phase Hashing function
Our Algorithm Two phases RSA
References
[1] W. K. Wootters and W. H. Zurek, "A single
quantum cannot be cloned," Nature, vol. 299, pp.
802-803, 1982.
[2] T. Hwang, K.-C. Lee, and C.-M. Li, "Provably
secure three-party authenticated quantum key
distribution protocols," Dependable and Secure
Computing, IEEE Transactions on, vol. 4, pp. 71-
80, 2007.
[3] W. Y. Hwang, I. G. Koh, and Y. D. Han,
"Quantum cryptography without public
announcement of bases," Physics Letters A, vol.
244, pp. 489-494, 1998.
[4] G. Zeng and W. Zhang, "Identity verification in
quantum key distribution," Physical Review A, vol.
61, p. 22303, 2000.
[5] S. J. Lomonaco, "A quick glance at quantum
cryptography," Cryptologia, vol. 23, pp. 1-41,
1999.
[6] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden,
"Quantum cryptography," Reviews of modern
physics, vol. 74, pp. 145-195, 2002.
[7] M. Elboukhari, M. Azizi, and A. Azizi, "Analysis
of the Security of BB84 by Model Checking,"
arXiv preprint arXiv:1005.4504, 2010.
[8] M. Zou and G. Zhang, "Information investigation
for B92 protocol in quantum cryptography," in
Photonics Asia 2004, 2005, pp. 181-191.
[9] M. I. Khan and M. Sher, "Protocols for secure
quantum transmission: a review of recent
developments," Pakistan Journal of Information
and Technology, vol. 2, pp. 265-276, 2003.
[10] C. H. Bennett and G. Brassard, "Quantum
cryptography: Public key distribution and coin
tossing," in Proceedings of IEEE International
Conference on Computers, Systems and Signal
Processing, 1984.
[11] N. Benletaief, H. Rezig, and A. Bouallegue,
"Reconciliation for practical quantum key
distribution with BB84 protocol," in
Mediterranean Microwave Symposium (MMS),
2011 11th, 2011, pp. 219-222.
[12] D. Jin, P. Verma, and S. Kartalopoulos, "Key
Distribution Using Dual Quantum Channels," in
Information Assurance and Security, 2008.
ISIAS'08. Fourth International Conference on,
2008, pp. 327-332.
[13] X.-y. Yang, Z. Ma, X. Lu, and H.-x. Li, "Quantum
secure direct communication based on partially
entangled states," in Information Assurance and
Security, 2009. IAS'09. Fifth International
Conference on, 2009, pp. 11-14.
[14] S. Ranganathan, N. Ramasamy, S. K. K.
Arumugam, B. Dhanasekaran, P. Ramalingam, V.
Radhakrishnan, and R. Karpuppiah, "A Three Party
Authentication for Key Distributed Protocol Using
Classical and Quantum Cryptography,"
International Journal of Computer Science
Issues(IJCSI), vol. 7, 2010.
[15] S. Ali, O. Mahmoud, and A. A. Hasan, "Multicast
network security using quantum key distribution
(QKD)," in Computer and Communication
Engineering (ICCCE), 2012 International
Conference on, 2012, pp. 941-947.
[16] F. Zamani and P. K. Verma, "A QKD protocol with
a two-way quantum channel," in Advanced
Networks and Telecommunication Systems (ANTS),
2011 IEEE 5th International Conference on, 2011,
pp. 1-6.
[17] R. Sarath, A. S. Nargunam, and R. Sumithra, "Dual
channel authentication in cryptography using
quantum stratagem," in Computing, Electronics
and Electrical Technologies (ICCEET), 2012
International Conference on, 2012, pp. 1044-1048.
86
... Recently, in Refs. [32][33][34], authentication protocols involving quantum key distributions have been proposed for various application areas, such as cloud computing etc. However, these protocols cannot provide the vehicle-identity privacy which is a crucial requirement in VANET scenarios. ...
... [64][65][66]. Also, Ref. [33] introduced a secure quantum algorithm which employs public key encryption to generate keys to enhance user authentication in quantum channel. In the scheme, Ref. [34] designed by Ankur and Karambir uses quantum key distribution and payload-based mutual authentication using elliptic curve cryptography (ECC) for Internet of things (IoT) devices. ...
Article
Full-text available
Many cryptographic techniques have been proposed to conceive a secure and privacy-oriented vehicular ad hoc network (VANET) for its practical deployment. The security of these techniques requires a common secret key to be shared between the communicating entities or depend upon the premise that some mathematical problems are computationally hard. However, because of the open nature of the wireless medium, the communication cannot be kept confidential and is prone to eavesdropping. Furthermore, with the arrival of quantum computers, these techniques are prone to quantum attacks—the time complexity of the assumed hard problem gets reduced from millions of years to a few seconds. In this paper, we propose a conditional privacy-preserving authentication scheme based on a quantum key distribution protocol for vehicle-to-infrastructure (V2I) communication. Our scheme inherits the properties of the quantum key distribution protocol. It does not require a secret authentication key to be transmitted conventionally and is resistant to quantum attacks. Apart from protecting VANETs against generic security threats, including node impersonation, message tampering, and repudiation, our scheme defends VANETs against man-in-the-middle attacks, replay attacks, etc. Besides, our protocol ensures message unlinkability, vehicle-identity privacy, and vehicle traceability if a vehicle misbehaves. The results obtained from the performance evaluation of our scheme confirm reasonable values of information leakage, key length, bit error probability, etc.
... In Ammar Odeh et al. work [22], the authors improve the quantum key distribution protocol by using the public key algorithm (RSA). They propose a three-party key distribution protocol. ...
Article
Full-text available
The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker measures a photon state, he disturbs that state. This protocol uses two channels: (1) A quantum channel for sending the quantum information (photons polarized). (2) And a classical channel for exchanging the polarization and the measurement information (base sets or filters). The BB84 supposes that the classical channel is secure, but it is not always right, because it depends on the methods used during the communication over this channel. If an eavesdropper gets the sender or the receiver filters or both of them, he can leak some or all bits of the constructed key. In this context, we contribute by creating a protocol that combines the BB84 protocol with an improved scheme of NTRU post-quantum cryptosystem, which will secure the transmitted information over the classical channel. NTRU is a structured lattice scheme, and it is based on the hardness to solve lattice problems in Rn. Actually, it is one of the most important candidates for the NIST post-quantum standardization project.
... But the algorithms stoped after eavesdropping detection. In [8], Ammar Odeh et al. have introduced a new method for quantum key distribution between three or more parties where around was a trusted center endow with the clients the required information to cautiously communicate among each other. ...
Article
Quantum cryptography is a way to deal with cryptography dependent on the laws of quantum mechanics. Cryptography depends on key sharing which plays a vital role. For providing a provable security during key distribution, quantum cryptography is used. There are many secure protocols and algorithms were proposed already in quantum cryptography. The Quantum Key Distribution faces several security issues, one among them, is Eavesdropper during the communication. It is an important issue which leads to thrashing of security by Man-in-the-middle (MITM) attack. In this paper, to detect eavesdropping and to enhance security during encryption, a Modified RSA method for encryption is proposed. The BB84 protocol for private key generation and distribution through quantum channel is used. Therefore, the proposed technique provides secure quantum key generation and distribution by which it prevents Eavesdropping security threat.
Chapter
Security is today’s foremost concern over the transmission channel. To lessen this security threat, DNA-based cryptography has emerged as an alternative to encryption of the data and exchanging of message between the sender and the receiver over a secured communication channel. Quantum superposition of states guarantees security against threats on any quantum communication channel. Again, DNA code set provides a way of encoding a binary text to its equivalent nucleotide bases. The idea of using quantum computing and DNA code set to perform the quantum session key exchange is that each pattern has its own unique properties and so, using a scheme that applies both is more secured than using any one alone. This is a nature-inspired technique, in which a plain text in binary coded form is transformed to its DNA equivalent sequence that is given a Watson-Crick’s transformation to obtain a first level of encoded message. This message is further encrypted using a key that is obtained by a quantum session key exchange protocol to prevent from the common threats in the transmission channel. Moreover, using our protocol, sender and receiver can easily detect the intervention of any attacker over the transmission network by calculating the error in the channel.
Chapter
Machine learning (ML) and artificial intelligence (AI) methods are some of the latest advancements in the field of computing. Among these methods, there are nature-inspired techniques such as deep learning and deep neural networks, which are inspired from the neural networks of the human brain. These methods are applicable towards the security of networks and network-connected machines from malware, intrusion, and other cyberattacks. For example, in dealing with modern cyber threats, some standard ML and AI methods that can be useful are malicious code recognition for malware analysis, object-based modeling to classify security threats, and heuristic rule systems for intrusion detection. In this way, ML and AI can play a key role in cyber threat detection and prevention. Due to the large amounts of data packets passing through a network, processing and parsing through that data to find malware, intrusion, or other malicious code and files can be overwhelmingly difficult for humans. Machine learning models can be trained to detect malicious patterns in data or files and can thus be used to automatically detect malware or intrusive activity. Additionally, humans are limited in terms of the amount of time or duration that they can spend, but once programmed, a machine learning model can continue running and operating nonstop to detect and prevent malicious code and files from entering a network-connected system. This can reduce human effort and minimize human error by automating the computing required to detect and thwart cyberattacks. This paper surveys and reviews different AI and ML methods that have been used in past literature for cybersecurity applications. The goal of this work is to aid cybersecurity researchers and professionals on how to employ AI and ML techniques for cybersecurity applications, such as malicious code detection, intrusion detection, and cyber threat analysis.
Article
Full-text available
In the existing study of third party authentication, for message transformation has less security against attacks such as man-in-the-middle, efficiency and so on. In this approach, we at hand give a Quantum Key Distribution Protocol (QKDP) to safeguard the security in larger networks, which uses the combination of merits of classical cryptography and quantum cryptography. Two three-party QKDPs, one implemented with implicit user authentication and the other with explicit mutual authentication, which include the following: 1. Security against such attacks as the man-in-the-middle, eavesdropping and replay. 2. Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among the existing QKDPs. 3. Two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.
Article
Full-text available
In this paper, we simulate the quantum channel with a binary symmetric channel and a binary erasure channel, a series channel and a Markovian chain channel in classical information theory, then calculate respectively the mutual information between the signal's deliverer, the legal receiver and the eavesdropper, the bit error rate during propagating the signals with the theory about the quantum measurement channel and the quantum information theory. For B92 protocol, a simple quantum cryptography distribution scheme, we study the bound and the property of mutual information obtained by the legal receiver and the eavesdropper, seek the relationship between the bit error rates and the eavesdropper's way, in two cases of the opaque eavesdropping and the translucent eavesdropping. A new criteria for checking the eavesdropper and ensuring the legal correspondent is estimated. Furthermore, the comparison in bit error rates caused respectively in two different measuring ways indicates that POVM is better than the standard measurement by the way of orthogonal projecting for reducing the bit error rate and increasing effective communication.
Conference Paper
This paper investigates a new information reconciliation method for quantum key distribution in the case where two parties exchange key in the presence of a malevolent eavesdropper. We have observed that reconciliation is a special case of channel coding and for that existing techniques can be adapted for reconciliation. We describe an explicit reconciliation method based on Turbo codes. We believe that the proposed method can improve the efficiency of quantum key distribution protocols based on discrete quantum states.
Conference Paper
Quantum key distribution (QKD) provides unconditional physical layer security for the distribution of encryption keys between legitimate parties. This paper presents a quantum key distribution protocol over a two-way quantum channel. This protocol does not require any classical communication channel for key sifting and key reconciliation. Utilizing the proposed protocol, one can reduce the overhead in the classical channel and increase the speed with which keys can be exchanged. Absence of a classical communication channel reduces operational overhead.
Conference Paper
We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architecture. The model is divided into three phases, the first phase, QKD network generate secure keys to encrypt not only data but also authentication process. The second phase, authentication making sure that no one except the legitimate user receive the message and making sure that nobody except the legitimate sender writes or modifies it. In the last phase, Multicast network encrypt the data by secure key and send it to receivers. The proposed scheme amid to provide a secure end to end communication for multicast network.
Article
Quantum cryptography could well be the first application of quantum mechanics at the single-quantum level. The rapid progress in both theory and experiment in recent years is reviewed, with emphasis on open questions and technological issues.
Article
A quantum digital authentication scheme based on hash function is proposed in this paper. The security of the quantum protocol lies on the existence of quantum one way function by fundamental quantum principle. The practical difficulties in quantum control and quantum computation made quantum protocol hard to implement. Lack of authentication made the quantum protocol vulnerable to hackers. By introducing two level quantum system, authentications can be achieved with the help of hash function. To guarantee the authenticity, hash codes are split in to two parts and exchange of code is made through two quantum channels. This scheme uses a programmable polarizer ensuring the quantum one way function and removing the practical difficulties of quantum control and quantum computation. The proposed scheme presents a novel method to construct secure quantum authentication for future communication
Article
The security of the previous quantum key distribution protocols, which is guaranteed by the laws of quantum physics, is based on legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In this paper, we proposed a quantum key verification scheme, which can simultaneously distribute the quantum secret key and verify the communicators' identity. Investigation shows that this proposed identity verification scheme is secure.
Article
If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is guaranteed to have the same polarization as the original photon. But is it possible by this or any other process to amplify a quantum state, that is, to produce several copies of a quantum system (the polarized photon in the present case) each having the same state as the original? If it were, the amplifying process could be used to ascertain the exact state of a quantum system: in the case of a photon, one could determine its polarization by first producing a beam of identically polarized copies and then measuring the Stokes parameters1. We show here that the linearity of quantum mechanics forbids such replication and that this conclusion holds for all quantum systems.