A single photon quantum user bi-directional authentication scheme over noiseless channel
In this paper, we propose a quantum user authentication protocol with single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate redu...
| Main Authors: | Buhari, Abudhahir, Ahmad Zukarnain, Zuriati, K. Subramaniam, Shamala, Zainuddin, Hishamuddin, Saharudin, Suhairi |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/68932/ http://psasir.upm.edu.my/id/eprint/68932/1/A%20single%20photon%20quantum%20user%20bi-directional%20authentication%20scheme%20over%20noiseless%20channel.pdf |
Similar Items
A method for authentication of multi-user key management using quantum key distribution over noiseless channel
by: Buhari, Abudhahir
Published: (2015)
by: Buhari, Abudhahir
Published: (2015)
An efficient modeling and simulation of quantum key distribution protocols using OptiSystem™
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
On transmission of a continuous signal via a noiseless binary channel
by: Dokuchaev, Nikolai
Published: (2015)
by: Dokuchaev, Nikolai
Published: (2015)
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
A hybrid architecture approach for quantum algorithms.
by: Aghaei, Mohammad Reza Soltan, et al.
Published: (2009)
by: Aghaei, Mohammad Reza Soltan, et al.
Published: (2009)
A quantum algorithm for minimal spanning tree
by: Aghaei, Mohammad Reza Soltan, et al.
Published: (2008)
by: Aghaei, Mohammad Reza Soltan, et al.
Published: (2008)
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Secured shared authentication key with two-way clock synchronization over multiparty Quantum Communication (KIV)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Co-channel interference mitigation techniques in multi-cell OFDMA Relay-Based Cellular Networks: a survey
by: Masoumiyan, Farzaneh, et al.
Published: (2014)
by: Masoumiyan, Farzaneh, et al.
Published: (2014)
Characterization of four states polarization flipper for single photon application
by: Abdul Khir , Mohd Fared, et al.
Published: (2010)
by: Abdul Khir , Mohd Fared, et al.
Published: (2010)
Near-infrared semiconductor photonic switches for quantum sensors
by: Saleeb-Mousa, Bruce
Published: (2022)
by: Saleeb-Mousa, Bruce
Published: (2022)
MQC-MB: multiphoton quantum communication using multiple-beam concept in free space optical channel
by: Harun, Nur Ziadah, et al.
Published: (2021)
by: Harun, Nur Ziadah, et al.
Published: (2021)
Method and apparatus for optical polarization photon generator
by: Mohd Zain, Mohd Norzaliman, et al.
Published: (2011)
by: Mohd Zain, Mohd Norzaliman, et al.
Published: (2011)
An adaptive relay selection scheme for enhancing network stability in VANETs
by: Al-Kharasani, Ameen Mohammed Abdulkarem, et al.
Published: (2020)
by: Al-Kharasani, Ameen Mohammed Abdulkarem, et al.
Published: (2020)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Adaptive resource allocation scheme based on call admission control and mobility prediction for multimedia services in wireless cellular networks
by: Al-Sanabani, Maher Ali, et al.
Published: (2008)
by: Al-Sanabani, Maher Ali, et al.
Published: (2008)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015)
by: Kamaruddin, Suhaili, et al.
Published: (2015)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Authentication securing methods for mobile identity: issues, solutions and challenges
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Enhanced Framework for the Construction of Photonic Crystal Fiber Based Quantum Communication System
by: Rahman, Md. Mijanur
Published: (2009)
by: Rahman, Md. Mijanur
Published: (2009)
The effect of mean photon number to the output key rate in quantum key distribution
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Quantum two-photon laser in Kerr-like medium / Faisal Hamood Ahmed Mathkoor
by: Faisal Hamood , Ahmed Mathkoor
Published: (2020)
by: Faisal Hamood , Ahmed Mathkoor
Published: (2020)
Real time thermal photon-photon interactions in the mixed space
by: Ahmed, M. A. A., et al.
Published: (2022)
by: Ahmed, M. A. A., et al.
Published: (2022)
Flood Control Distance Vector Hop (FCDV-Hop) localization in wireless sensor networks
by: Zazali, Azyyati Adiah, et al.
Published: (2020)
by: Zazali, Azyyati Adiah, et al.
Published: (2020)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Similar Items
-
A method for authentication of multi-user key management using quantum key distribution over noiseless channel
by: Buhari, Abudhahir
Published: (2015) -
An efficient modeling and simulation of quantum key distribution protocols using OptiSystem™
by: Buhari, Abudhahir, et al.
Published: (2012) -
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019) -
On transmission of a continuous signal via a noiseless binary channel
by: Dokuchaev, Nikolai
Published: (2015) -
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)