A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases

نویسندگان

  • Es-Said Chanigui
  • Abdelmalek Azizi
چکیده

Corresponding Author: Es-said Chanigui Department of Mathematics and Computer Science, FSO, University Mohamed I, Oujda, Morocco Email: [email protected] Abstract: This study provides a simple variation of the protocol of quantum key expansion proposed by Hwang. Some weaknesses relating to the step of public discussions for error detection are analyzed and an attack strategy, allowing the eavesdropper to get partial information about the used bases, is put forward. Using the One-Time Pad cipher, we propose a possible scheme which is secure against the presented attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified Novel Quantum Key Exchange using BB84 Algorithm

With the increasing number of eavesdroppers on communication channels, securing the reliability of digital communication has become a herculean task. For any communication and information exchange the most important step of securing the data is encryption and decryption (cryptography). The primary step involved in any efficient cryptographic system is Key Distribution. The paper deals with an e...

متن کامل

A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification

This paper suggests an improvement to the BB84 scheme in Quantum key distribution. The original scheme has its weakness in letting quantifiably more information gain to an eavesdropper during public announcement of unencrypted bases lists. The security of the secret key comes at the expense of the final key length. We aim at exploiting the randomness of preparation (measurement) basis and the b...

متن کامل

Quantum key distribution with blind polarization bases.

We propose a new quantum key distribution scheme that uses the blind polarization basis. In our scheme the sender and the receiver share key information by exchanging qubits with arbitrary polarization angles without basis reconciliation. As only random polarizations are transmitted, our protocol is secure even when a key is embedded in a not-so-weak coherent-state pulse. We show its security a...

متن کامل

classical privicy amplification can be used for the quantum key distribution

We show that, if any classical errorcation(CE) and privicy amplification(PA) scheme used to distill the final key in the quantum key distribution is unsecure, it will cause contradicts in the pure classical case. Thus we draw the conclusion that all secure CE and PA are secure for the final key distillation in the quantum key distribution Since Bennett and Brassard [1] suggested their quantum k...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCS

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2015