Adhikari et al., 2021 - Google Patents
Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD ProtocolsAdhikari et al., 2021
- Document ID
- 15326998000921902620
- Author
- Adhikari T
- Ghosh A
- Khan A
- Laha S
- Mitra P
- Karmakar R
- Publication year
- Publication venue
- 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)
External Links
Snippet
Distribution of keys in classical cryptography is one of the most significant affairs to deal with. The computational hardness is the fundamental basis of the security of these keys. However, in the era of quantum computing, quantum computers can break down these keys with their …
- 230000005610 quantum mechanics 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chang et al. | Quantum secure direct communication and authentication protocol with single photons | |
Lin et al. | Efficient semi-quantum private comparison using single photons | |
Alléaume et al. | Using quantum key distribution for cryptographic purposes: a survey | |
Liu et al. | Efficient quantum private comparison employing single photons and collective detection | |
US7181011B2 (en) | Key bank systems and methods for QKD | |
Sharma et al. | Identity based secure authentication scheme based on quantum key distribution for cloud computing | |
Lo et al. | Quantum cryptography | |
Liu et al. | Single-photon multiparty quantum cryptographic protocols with collective detection | |
Cavaliere et al. | The security implications of quantum cryptography and quantum computing | |
Xu et al. | An overview of quantum-safe approaches: quantum key distribution and post-quantum cryptography | |
Haitjema | A survey of the prominent quantum key distribution protocols | |
Sabani et al. | Quantum Key Distribution: Basic Protocols and Threats | |
Vasani et al. | Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions | |
Abushgra et al. | A shared secret key initiated By EPR authentication and Qubit transmission channels | |
Adhikari et al. | Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols | |
Jia et al. | An improved QKD protocol without public announcement basis using periodically derived basis | |
Nandal et al. | A survey and comparison of some of the most prominent QKD protocols | |
Joshi et al. | From Pre-Quantum to Post-Quantum RSA | |
Mao et al. | Quantum Key Distribution and Security Studies | |
Sun | Comparative Study of RSA Encryption and Quantum Encryption | |
Malathy et al. | Quantum Cryptographic Techniques | |
Petrache et al. | Security in Quantum Computing | |
Dervisevic et al. | Bases selection with pseudo-random functions in BB84 scheme | |
Singhrova | Quantum key distribution-based techniques in IoT | |
Rogers | Broadband quantum cryptography |