Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing ke...
| Main Authors: | Majeed, Mohammed Munther A, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/5437/ http://irep.iium.edu.my/5437/1/jcs6101123-1129.pdf |
Similar Items
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum estimation of impurity effect for KDP crystal growth
by: Asakuma, Y., et al.
Published: (2008)
by: Asakuma, Y., et al.
Published: (2008)
Ubiquitous RFID network for highway monitoring and management
by: Johari, Jaiz A. Y, et al.
Published: (2014)
by: Johari, Jaiz A. Y, et al.
Published: (2014)
Real time tracking in 3D space by robotic vision
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2007)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2007)
Recovery modeling in MPLS networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2014)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2014)
Availability evaluation of scalable complex networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2012)
Dark Current mechanisms in quantum dot laser structures
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2011)
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2011)
Data mining technique on Cardioid graph based ECG biometric authentication
by: Sidek, Khairul Azami, et al.
Published: (2011)
by: Sidek, Khairul Azami, et al.
Published: (2011)
The influence of EDFA's configurations on the behavioral trends of gain and noise figure
by: Sellami , Ali, et al.
Published: (2014)
by: Sellami , Ali, et al.
Published: (2014)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
2-Channel AVM System: software tool for calibration
by: Sediono, Wahju
Published: (2018)
by: Sediono, Wahju
Published: (2018)
Intelligent auto tracking in 3D space by image processing
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
Low cost SCADA system with auto fault detection using micro controller
by: Shah, M. Azman, et al.
Published: (2005)
by: Shah, M. Azman, et al.
Published: (2005)
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
Effect of modulation p-doping on the optical properties of quantum dot laser structure
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2010)
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2010)
An emergency medical care network system for fetal ECG monitoring
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
A study of packet scheduling with mobile cellular channel impairments
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2012)
Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm
by: Mohd Hassan Wong , Fadhli Wong, et al.
Published: (2001)
by: Mohd Hassan Wong , Fadhli Wong, et al.
Published: (2001)
Analysis of rain fade duration over satellite-earth path at Ku-Band in tropics
by: Dao, Hassan, et al.
Published: (2012)
by: Dao, Hassan, et al.
Published: (2012)
Topological structure of complex networks and its importance in diffusion
by: Mahesar, Abdul Waheed, et al.
Published: (2015)
by: Mahesar, Abdul Waheed, et al.
Published: (2015)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
A Study of Growth Mechanism of KDP and ADP Crystals by Means of Quantum Chemistry
by: Asakuma, Y, et al.
Published: (2008)
by: Asakuma, Y, et al.
Published: (2008)
A fault-tolerant multi-path multi-channel routing protocol for Cognitive Radio Ad Hoc Networks
by: Che-Aron, Zamree, et al.
Published: (2015)
by: Che-Aron, Zamree, et al.
Published: (2015)
Design and analysis of a first-order sigma-delta analog-to-digital converter for MEMS resistive sensor
by: Ma, Li Ya, et al.
Published: (2010)
by: Ma, Li Ya, et al.
Published: (2010)
Novel MEMS fully differential capacitive transducer design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
5.5-10.5 GHz IR-UWB Pulse Generator for
Narrowband Interference Mitigation
by: Ahmed R., Mohammed, et al.
Published: (2012)
by: Ahmed R., Mohammed, et al.
Published: (2012)
A method for authentication of multi-user key management using quantum key distribution over noiseless channel
by: Buhari, Abudhahir
Published: (2015)
by: Buhari, Abudhahir
Published: (2015)
A low-cost first-order sigma-delta converter design and analysis
by: Ya, Ma Li, et al.
Published: (2011)
by: Ya, Ma Li, et al.
Published: (2011)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Similar Items
-
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014) -
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)