Client-server Identification Protocols with Quantum PUF
نویسندگان
چکیده
Recently, major progress has been made towards the realisation of quantum internet to enable a broad range classically intractable applications. These applications such as delegated computation require running secure identification protocol between low-resource and high-resource party provide communication. In this work, we propose two protocols based on emerging hardware solutions, Physical Unclonable Functions (qPUFs). The first allows prove its identity in second protocol, it is vice-versa. Unlike existing Quantum Read-out PUFs which rely security against specific family attacks, our provable exponential any Polynomial-Time adversary with resource-efficient parties. We comprehensive comparison proposed terms resources memory computing ability required both parties well communication overhead them.
منابع مشابه
Client/server messaging protocols in serverless environments
In this paper we discuss the adaptation of TCP transport-oriented client–server messaging protocols to many-to-many peer-to-peer networking environments more suitable for deployment in dynamic wireless networks capable of multicast forwarding. We describe four main issues in adapting such protocols: exposing a network server for receiving TCP session data; the creation of server-side semantic p...
متن کاملServer-side verification of client behavior in cryptographic protocols
Numerous exploits of client-server protocols and applications involve modifying clients to behave in ways that untampered clients would not, such as crafting malicious packets. In this paper, we demonstrate practical verification of a cryptographic protocol client’s messaging behavior as being consistent with the client program it is believed to be running. Moreover, we accomplish this without ...
متن کاملInspection Mechanism for Server-and-client Protocols with Private-key Cipher
In an open network, how to provide deterrents to malicious behaviors is an important issue. A common solution is the use of cryptographic primitives. In this solution, execution logs are stored by each entity and used when needs arise for trouble settlement or judgment; authorities are involved mainly in the settlement phase. Depending on system-design and security policies, however, more activ...
متن کاملBest Practices Client/server
The goal: Not just better technology but better business processes that make a company more competitive. Client/server systems link clients and servers via a network to support distributed computation, analysis, and presentation, providing a common method for distributing computer power within companies. Although companies are embracing client/server technology when moving from legacy systems [...
متن کاملPerformance Analysis of Client-Server Systems with Aggressive Server Replies
Replies Greg Franks C. M. Woodside Department of Systems and Computer Engineering Carleton University Ottawa, Ontario, Canada, K1S 5B6 Abstract Client-Server systems generally use the sendreceive-reply messaging paradigm for inter-process communication. In the most general case, the server process can be structured to continue to execute after replying to the client. Analytic models for closed ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM transactions on quantum computing
سال: 2021
ISSN: ['2643-6817', '2643-6809']
DOI: https://doi.org/10.1145/3484197