In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on jammable public channels between two parties, Alice and Bob. First, via an arbitrator (Trent), the protocol provides both quantum authentication and quantum key distribution. Second, due to the registration to the Trusted Third Party and the initial bit string of Alice (or Bob), used for reversing the photon, only Alice (or Bob) could make the operation according to IA (or IB) . In other words, the protocol also provides quantum signature. © 2007 IEEE
Quantum key distribution algorithms use a quantum communication channel with quantum information and...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
Cryptography is the background of protecting the flowed information between various communicated par...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
We propose a quantum key distribution protocol with quantum based user authentication. User authenti...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Quantum Cryptography (QC) is the emerging field of the current world and the potential player of the...
Quantum key distribution (QKD) is one of the recent revolutions in cryptography field that was annou...
In this paper, we propose a quantum user authentication protocol with single photon based on short s...
Background: A new approach for the implementation of Quantum Cryptography is proposed in this paper....
A successful implementation of any secure communication protocols requires the identity authenticati...
In today’s era of internet and network application, need for security has become of vital importance...
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowi...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Data protection and information security have been the essence of communication in today's digital e...
Quantum key distribution algorithms use a quantum communication channel with quantum information and...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
Cryptography is the background of protecting the flowed information between various communicated par...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
We propose a quantum key distribution protocol with quantum based user authentication. User authenti...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Quantum Cryptography (QC) is the emerging field of the current world and the potential player of the...
Quantum key distribution (QKD) is one of the recent revolutions in cryptography field that was annou...
In this paper, we propose a quantum user authentication protocol with single photon based on short s...
Background: A new approach for the implementation of Quantum Cryptography is proposed in this paper....
A successful implementation of any secure communication protocols requires the identity authenticati...
In today’s era of internet and network application, need for security has become of vital importance...
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowi...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Data protection and information security have been the essence of communication in today's digital e...
Quantum key distribution algorithms use a quantum communication channel with quantum information and...
Abstract: In this paper we provide a quantum authentication protocol. The two parties share a sequen...
Cryptography is the background of protecting the flowed information between various communicated par...