Multicast Network Security using Quantum Key Distribution (QKD)

We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architecture. The model is divided into three phases, the first phase, QKD network gener...

Full description

Bibliographic Details
Main Authors: Ali, Sellami, Mahmoud, Omer, Hassan Abdalla Hashim, Aisha
Format: Proceeding Paper
Language:English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/26189/
http://irep.iium.edu.my/26189/1/Multicast_Network_Security_using_Quantum_Key_Distribution.pdf
_version_ 1848779599190687744
author Ali, Sellami
Mahmoud, Omer
Hassan Abdalla Hashim, Aisha
author_facet Ali, Sellami
Mahmoud, Omer
Hassan Abdalla Hashim, Aisha
author_sort Ali, Sellami
building IIUM Repository
collection Online Access
description We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architecture. The model is divided into three phases, the first phase, QKD network generate secure keys to encrypt not only data but also authentication process. The second phase, authentication making sure that no one except the legitimate user receive the message and making sure that nobody except the legitimate sender writes or modifies it. In the last phase, Multicast network encrypt the data by secure key and send it to receivers. The proposed scheme amid to provide a secure end to end communication for multicast network
first_indexed 2025-11-14T15:20:20Z
format Proceeding Paper
id iium-26189
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:20:20Z
publishDate 2012
recordtype eprints
repository_type Digital Repository
spelling iium-261892020-08-17T03:56:05Z http://irep.iium.edu.my/26189/ Multicast Network Security using Quantum Key Distribution (QKD) Ali, Sellami Mahmoud, Omer Hassan Abdalla Hashim, Aisha T Technology (General) We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architecture. The model is divided into three phases, the first phase, QKD network generate secure keys to encrypt not only data but also authentication process. The second phase, authentication making sure that no one except the legitimate user receive the message and making sure that nobody except the legitimate sender writes or modifies it. In the last phase, Multicast network encrypt the data by secure key and send it to receivers. The proposed scheme amid to provide a secure end to end communication for multicast network 2012 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/26189/1/Multicast_Network_Security_using_Quantum_Key_Distribution.pdf Ali, Sellami and Mahmoud, Omer and Hassan Abdalla Hashim, Aisha (2012) Multicast Network Security using Quantum Key Distribution (QKD). In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, 3-5 Jul 2012, Kuala Lumpur.
spellingShingle T Technology (General)
Ali, Sellami
Mahmoud, Omer
Hassan Abdalla Hashim, Aisha
Multicast Network Security using Quantum Key Distribution (QKD)
title Multicast Network Security using Quantum Key Distribution (QKD)
title_full Multicast Network Security using Quantum Key Distribution (QKD)
title_fullStr Multicast Network Security using Quantum Key Distribution (QKD)
title_full_unstemmed Multicast Network Security using Quantum Key Distribution (QKD)
title_short Multicast Network Security using Quantum Key Distribution (QKD)
title_sort multicast network security using quantum key distribution (qkd)
topic T Technology (General)
url http://irep.iium.edu.my/26189/
http://irep.iium.edu.my/26189/1/Multicast_Network_Security_using_Quantum_Key_Distribution.pdf