A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from se...
| Main Authors: | Al-Khateeb, Khalid A. Saeed, Abdul Majeed, Mohammed Munther, Ridza, Mohamed, Saeb, Magdy M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/22653/ http://irep.iium.edu.my/22653/1/p341.pdf |
Similar Items
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Abandoned housing projects in Malaysia and the prospect of DP: an overview
by: Abdul Razak, Dzuljastri, et al.
Published: (2015)
by: Abdul Razak, Dzuljastri, et al.
Published: (2015)
Extracellular Polyhydroxyalkanoate Depolymerase by Acidovorax sp. DP5
by: Vigneswari, S., et al.
Published: (2015)
by: Vigneswari, S., et al.
Published: (2015)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Agonist stimulus trafficking by human prostanoid CRTH2 (DP2) receptors.
by: McArthur Wilson, Richard John
Published: (2007)
by: McArthur Wilson, Richard John
Published: (2007)
Theoretical analysis, optimization, and experimental evaluation of dual function DP R-EDFA
by: Hossain, Nadir, et al.
Published: (2007)
by: Hossain, Nadir, et al.
Published: (2007)
RNA helicase DP103 and TAK1: a new connection in cancer
by: Shin, E., et al.
Published: (2015)
by: Shin, E., et al.
Published: (2015)
DEAD-box helicase DP103 defines metastatic potential of human breast cancers
by: Shin, E., et al.
Published: (2014)
by: Shin, E., et al.
Published: (2014)
Quantum estimation of impurity effect for KDP crystal growth
by: Asakuma, Y., et al.
Published: (2008)
by: Asakuma, Y., et al.
Published: (2008)
Scaling and numerical simulation analysis of 50 nm MOSFET incorporating dielectric pocket (DP-MOSFET)
by: M. N., Zul Atfyi Fauzan, et al.
Published: (2008)
by: M. N., Zul Atfyi Fauzan, et al.
Published: (2008)
An Example Proposal: An Examination of Effects of Self-Concept, Destination Personality, and SC-DP Congruence on Tourist Behavior.
by: Li, X., et al.
Published: (2011)
by: Li, X., et al.
Published: (2011)
Modelling numerical simulation of DP590 steel
undergoing finite strain deformation of
uniaxial tensile test
by: Kamarulzaman, M. F., et al.
Published: (2022)
by: Kamarulzaman, M. F., et al.
Published: (2022)
Discovery of fevipiprant (NVP-QAW039), a potent and selective DP2 receptor antagonist for treatment of asthma
by: Sandham, David A., et al.
Published: (2017)
by: Sandham, David A., et al.
Published: (2017)
Effect of Ferritic - Martensitic Constituent on Mechanical Property and Corrosion Behaviour of Medium Carbon Dual Phase (DP) Steel
by: Radhiyah, Abd Aziz, et al.
Published: (2018)
by: Radhiyah, Abd Aziz, et al.
Published: (2018)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A Study of Growth Mechanism of KDP and ADP Crystals by Means of Quantum Chemistry
by: Asakuma, Y, et al.
Published: (2008)
by: Asakuma, Y, et al.
Published: (2008)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
A protocol for secret key infusion from satellite transmissions
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
Consumers’ perception on Islamic home financing: empirical evidences on Bai Bithaman Ajil (BBA) and diminishing partnership (DP) in Malaysia
by: Abdul Razak, Dzuljastri, et al.
Published: (2009)
by: Abdul Razak, Dzuljastri, et al.
Published: (2009)
A method for authentication of multi-user key management using quantum key distribution over noiseless channel
by: Buhari, Abudhahir
Published: (2015)
by: Buhari, Abudhahir
Published: (2015)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Consumers' perception on Islamic home financing: empirical evidences on Bai Bithaman Ajil(BBA) and diminishing partnership (DP) modes of financing in Malaysia
by: Abdul Razak, Dzuljastri, et al.
Published: (2011)
by: Abdul Razak, Dzuljastri, et al.
Published: (2011)
Study the effect of martensite-ferrite comstituents phase of the plain medium carbon dual phase (DP) steel on the mechanical property and corrosion behavior
by: Maisalsadila, Ismail
Published: (2017)
by: Maisalsadila, Ismail
Published: (2017)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
The effect of nonhuman's external regulation on children's responses to detect children with developmental problems (DP) associated with the natural development of self-regulation during learning tasks
by: Agina, A., et al.
Published: (2012)
by: Agina, A., et al.
Published: (2012)
Mechanism of the induction of endoplasmic reticulum stress by the anti-cancer agent, di-2-pyridylketone 4,4-dimethyl-3-thiosemicarbazone (Dp44mT): Activation of PERK/eIF2a, IRE1a, ATF6 and calmodulin kinase
by: Merlot, A., et al.
Published: (2016)
by: Merlot, A., et al.
Published: (2016)
Mechanism of the induction of endoplasmic reticulum stress by the anti-cancer agent, di-2-pyridylketone 4,4-dimethyl-3-thiosemicarbazone (Dp44mT): activation of PERK/eIF2α, IRE1α, ATF6 and calmodulin kinase
by: Merlot, Angelica M., et al.
Published: (2016)
by: Merlot, Angelica M., et al.
Published: (2016)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
A study into the right to sex education in Malaysia primary school: a comparative study / Sri Kartika D.P. Bali and Nurul Arni Annas Goh
by: D.P. Bali, Sri Kartika, et al.
Published: (2011)
by: D.P. Bali, Sri Kartika, et al.
Published: (2011)
Similar Items
-
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Abandoned housing projects in Malaysia and the prospect of DP: an overview
by: Abdul Razak, Dzuljastri, et al.
Published: (2015)