Three Party Authenticated Key Distribution using Quantum Cryptography

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 4

Abstract

 Cryptography is the science of writing in secret message and is an ancient art. In data and  telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. Over the last two decades an interesting field of the cryptography has raised from non classical atomic theory, Quantum Physics. This field is known as Quantum cryptography. Unlike the classical cryptography of public and private key ciphers which analyse the strength of a cipher by means of mathematical attacks and formulas, the security of the quantum cryptography is ensured by laws of Quantum Physics. In this paper, we present a method for three party authentication using quantum cryptography. Our method depends on partial trusted third party, so that the key is not revealed to the trusted third party.

Authors and Affiliations

V. Padmaja

Keywords

Related Articles

Amulti-Agent Architecture for a Co-Modal Transport System

Improving the co-modal transport and introducing systems for traveler information is becoming more and more urgent in our society in order to guarantee a high level of mobility in the long term. The goal of this research...

 Effectiveness of Internal Audits in Public Educational Institutions in Kenya: Rethinking Value

 Internal auditing has become a factor of the new accountability and control era. The manner in which public sector entities maintain internal control and how they are held accountable has evolved to require more tr...

 Fatigue Performance in Grinding and Turning: An Overview

 This paper analysis the influence of Abrasive Flow Machining (AFM), Turning and Grinding on fatigue performance of Fe250. Surface condition has a strong effect on fatigue life, and that most surfaces produced by...

An Enhanced Security System for Web Authentication

Web authentication has low security in these days. Todays, For Authentication purpose, Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from...

 Development of Algorithm for Voice Operated Switch for Digital Audio Control Systems

 VOS (voice Operated Switch) is a switch that operates when sound over a certain threshold is detected. It is usually used to turn on a transmitter or recorder when someone speaks and turn it off when they stop spea...

Download PDF file
  • EP ID EP151712
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

V. Padmaja (2013).  Three Party Authenticated Key Distribution using Quantum Cryptography. International Journal of Modern Engineering Research (IJMER), 3(4), 2327-2329. https://europub.co.uk/articles/-A-151712