Three Party Authenticated Key Distribution using Quantum Cryptography
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 4
Abstract
Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. Over the last two decades an interesting field of the cryptography has raised from non classical atomic theory, Quantum Physics. This field is known as Quantum cryptography. Unlike the classical cryptography of public and private key ciphers which analyse the strength of a cipher by means of mathematical attacks and formulas, the security of the quantum cryptography is ensured by laws of Quantum Physics. In this paper, we present a method for three party authentication using quantum cryptography. Our method depends on partial trusted third party, so that the key is not revealed to the trusted third party.
Authors and Affiliations
V. Padmaja
ATC Determination for Different Transactions Using ACPTDF
Abstract: A fair competition needs open access and nondiscriminatory operation of the transmission network. Open access to the transmission system places an emphasis on the intensive use interconnected network reli...
Thermodynamic properties and modeling of sorption isotherms for longer storage of Urtica urens leaves
Moisture equilibrium data of Urtica urens leaves by desorption and adsorption were determined at 30, 40, and 50°C. The isotherms were determined by a static gravimetric method for various temperature and humidi...
Towards Secure and Dependable Storage Services in Cloud Computing
Cloud Computing has emerged as one of the most influential paradigms in the IT industry for last few years. In such computing the data confidentiality, flexibility and access control are the main parameters to be co...
Integration of Struts & Spring & Hibernate for Enterprise Applications
The proposal of this paper is to present Spring Framework which is widely used in developing enterprise applications. Considering the current state where applications are developed using the EJB model, Spring Frame...
Optimal Converge cast Methods for Tree- Based WSNs
A tree- based wireless sensor network (WSN) is a collection of sensors nodes, such as sink is the root of tree and leaves are the nodes. Data in such a topology flows from sensor nodes (leaves) to the sink (root) n...