Tight Finite Key Scheme for Quantum Key Distribution (qkd) Protocol to Authenticate Multi- Party System in Cloud Infrastructure

نویسندگان

  • Roszelinda Khalid
  • Zuriati Ahmad Zulkarnain
چکیده

Confidentiality, integrity and authentication are the key concerns in this cloud infrastructure. The aim of this research is to introduce a new tight finite key scheme for authentication process in order to establish a connection between legitimate users in cloud infrastructure. In this case we are using quantum channel and also quantum key distribution (QKD) protocol to replace the existing common channel. We are proposing a new tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. A new authentication scheme based on Von Neumann and Shannon entropies. This may reduce the possibility of losing a private key by producing a high efficient key rate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution

W-state is an important resource for many quantum information processing tasks. In this paper, we for the first time propose a multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on W-state. With linear optics, we design a W-state analyzer in order to distinguish the four-qubit W-state. This analyzer constructs the measurement device for four-party MDI-Q...

متن کامل

Authentication Mechanism for Cloud Network and Its Fitness with Quantum Key Distribution Protocol: a Survey

Communication in a huge network such as in cloud infrastructure is vast in demand. Almost all classified information transferred via the communication channel. Most types of attack can cause the classified information be in the hand of unauthorized party. This situation will lead to information disclosure and the user feel unsecured for using the services like offered by cloud infrastructure. B...

متن کامل

Improving Classical Authentication over a Quantum Channel

We propose a quantum protocol to authenticate classical messages that can be used to replace Wegman–Carter’s classical authentication scheme in quantum key distribution (QKD) protocols. We show that the proposed scheme achieves greater conditional entropy of the seed for the intruder given her (quantum) observation than the classical case. The proposed scheme is suitable for situations where th...

متن کامل

No-cloning principal can alone provide security

Existing quantum key distribution schemes need the support of classical authentication scheme to ensure security. This is a conceptual drawback of quantum cryptography. It is pointed out that quantum cryptosystem does not need any support of classical cryptosystem to ensure security. No-cloning principal can alone provide security in communication. Even no-cloning principle itself can help to a...

متن کامل

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013