Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-inthe-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.
Authors and Affiliations
V V S NARAYANA MURTHY KAMINI, Amudala Ratna Raju, M Vamsi Krishna
Finger Vein Based User Identification Using Differential Box Counting
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches...
Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets
Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...
Dg: Modeling Network Behavior for Static and Dynamic Websites
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data...
Rattle Adversary In IP Address Race Of Puzzler Networks
Large datasets of existent network streams procured from the mutual network are indispensable resource for the exploration group. An application encompasses network modeling and simulation, recognition of privacy ass...
Performance Analysis of RTOS with GPOS for Heart Rate and Temperature Measurement Wireless System Using Raspberry Pi
The objective of the project is to analyze the General Purpose Operation System (GPOS) performance with Real Time Operating System (RTOS) using a Heartbeat sensor and temperature sensor as a real time application. Me...