Quantum authentication of classical messages
نویسندگان
چکیده
منابع مشابه
Quantum Authentication of Classical Messages with Perfect Security
In this work we have investigated how quantum resources can improve the security of protocol for authentication of classical messages, introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We have started by showing that a BB84-type encoding of secret bits ...
متن کاملAuthentication of Quantum Messages
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal defin...
متن کاملSecure authentication of classical messages with a one-ebit quantum key
Although key distribution is arguably the most studied context on which to apply quantum cryptography techniques, message authentication, i.e. certifying the identity of the message originator and the integrity of the message sent, can also benefit from the use of quantum resources. Classically, message authentication can be performed by techniques based on hash functions. However, the security...
متن کاملImproving Classical Authentication with Quantum Communication
Abstract We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more ...
متن کاملClassical Authentication Aided Three-Stage Quantum Protocol
This paper modifies Kak’s three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key dist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2001
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.64.062309