Results 1 - 10
of
227
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
, 2012
"... Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it allows two parties using only public authenticated communication to establish a secret session key which can be used to encrypt messages. But if the session key is compromised, the confidentiality of ..."
Abstract
- Add to MetaCart
anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD
Entity Authentication and Key Distribution
, 1993
"... Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of these p ..."
Abstract
-
Cited by 578 (13 self)
- Add to MetaCart
of these problems in the complexity-theoretic framework of modern cryptography. Addressed in detail are two problems of the symmetric, two-party setting: mutual authentication and authenticated key exchange. For each we present a definition, protocol, and proof that the protocol meets its goal, assuming
Classical Authenticated Key Exchange and Quantum Cryptography
"... the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security proble ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
. In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced
Key recycling in authentication
, 2012
"... In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remai ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
without any additional error than this ε. We illustrate this by applying it to quantum key distribution (QKD): if the same hash function is recycled to authenticate the classical communication in every round of a QKD protocol, and used ℓ times per round, the total error after r rounds is upper bounded
Integrated Quantum and Classical Key Scheme for Two Servers Password Authentication
"... Abstract: Problem statement: Traditional user authentication system uses passwords for their secured accessibility in a central server, which is prone to attack by adversaries. The adversaries gain access to the contents of the user in attack prone servers. To overcome this problem, the multi-server ..."
Abstract
- Add to MetaCart
to the user and the back end control server visible to the service server. The performance measure of the user password made for the transformed two long secrets held by both service and control server. Further the proposal applied quantum key distribution model along with classical key exchange in the two
Entity Authentication and Key Distribution
"... Abstract Entity authentication and key distribution are central cryptographic problems in distributed computing--but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of ..."
Abstract
- Add to MetaCart
of these problems in the complexity-theoretic framework of modern cryptography. Addressed in detail are two problems of the symmetric, two-party setting: mutual authentication and authenticated key exchange. For each we present a definition, protocol, and proof that the protocol meets its goal, assuming
The security of practical quantum key distribution
, 2009
"... Quantum key distribution �QKD � is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of ..."
Abstract
-
Cited by 50 (1 self)
- Add to MetaCart
Quantum key distribution �QKD � is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security
The Case for Quantum Key Distribution
, 2009
"... Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Alt ..."
Abstract
- Add to MetaCart
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions
Detecting quantum correlations for quantum key distribution
"... Practical quantum key distribution can be understood as a two-step procedure: in a first step two parties exchange quantum mechanical signals and perform measurements on them, in a second step auxiliary classical communication protocols are performed over an authenticated public channel to transform ..."
Abstract
- Add to MetaCart
Practical quantum key distribution can be understood as a two-step procedure: in a first step two parties exchange quantum mechanical signals and perform measurements on them, in a second step auxiliary classical communication protocols are performed over an authenticated public channel
Unifying classical and quantum key distillation
, 2008
"... Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key ..."
Abstract
- Add to MetaCart
to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ρABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios
Results 1 - 10
of
227