Nothing Special   »   [go: up one dir, main page]

Adhikari et al., 2021 - Google Patents

Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols

Adhikari et al., 2021

Document ID
15326998000921902620
Author
Adhikari T
Ghosh A
Khan A
Laha S
Mitra P
Karmakar R
Publication year
Publication venue
2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)

External Links

Snippet

Distribution of keys in classical cryptography is one of the most significant affairs to deal with. The computational hardness is the fundamental basis of the security of these keys. However, in the era of quantum computing, quantum computers can break down these keys with their …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Similar Documents

Publication Publication Date Title
Chang et al. Quantum secure direct communication and authentication protocol with single photons
Lin et al. Efficient semi-quantum private comparison using single photons
Alléaume et al. Using quantum key distribution for cryptographic purposes: a survey
Liu et al. Efficient quantum private comparison employing single photons and collective detection
US7181011B2 (en) Key bank systems and methods for QKD
Sharma et al. Identity based secure authentication scheme based on quantum key distribution for cloud computing
Lo et al. Quantum cryptography
Liu et al. Single-photon multiparty quantum cryptographic protocols with collective detection
Cavaliere et al. The security implications of quantum cryptography and quantum computing
Xu et al. An overview of quantum-safe approaches: quantum key distribution and post-quantum cryptography
Haitjema A survey of the prominent quantum key distribution protocols
Sabani et al. Quantum Key Distribution: Basic Protocols and Threats
Vasani et al. Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions
Abushgra et al. A shared secret key initiated By EPR authentication and Qubit transmission channels
Adhikari et al. Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols
Jia et al. An improved QKD protocol without public announcement basis using periodically derived basis
Nandal et al. A survey and comparison of some of the most prominent QKD protocols
Joshi et al. From Pre-Quantum to Post-Quantum RSA
Mao et al. Quantum Key Distribution and Security Studies
Sun Comparative Study of RSA Encryption and Quantum Encryption
Malathy et al. Quantum Cryptographic Techniques
Petrache et al. Security in Quantum Computing
Dervisevic et al. Bases selection with pseudo-random functions in BB84 scheme
Singhrova Quantum key distribution-based techniques in IoT
Rogers Broadband quantum cryptography