Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs

Abstract

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-inthe-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.

Authors and Affiliations

V V S NARAYANA MURTHY KAMINI, Amudala Ratna Raju, M Vamsi Krishna

Keywords

Related Articles

Finger Vein Based User Identification Using Differential Box Counting

The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches...

Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets

Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...

Dg: Modeling Network Behavior for Static and Dynamic Websites

Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data...

Rattle Adversary In IP Address Race Of Puzzler Networks

Large datasets of existent network streams procured from the mutual network are indispensable resource for the exploration group. An application encompasses network modeling and simulation, recognition of privacy ass...

Performance Analysis of RTOS with GPOS for Heart Rate and Temperature Measurement Wireless System Using Raspberry Pi

The objective of the project is to analyze the General Purpose Operation System (GPOS) performance with Real Time Operating System (RTOS) using a Heartbeat sensor and temperature sensor as a real time application. Me...

Download PDF file
  • EP ID EP27503
  • DOI -
  • Views 365
  • Downloads 6

How To Cite

V V S NARAYANA MURTHY KAMINI, Amudala Ratna Raju, M Vamsi Krishna (2012). Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs. International Journal of Research in Computer and Communication Technology, 1(6), -. https://europub.co.uk/articles/-A-27503