DocumentCode :
3586061
Title :
Classification of quantum authentication protocols and calculation of their complexity
Author :
Ghilen, Aymen ; Belmabrouk, Hafedh ; Bouallegue, Ridha
Author_Institution :
Lab. of Electron. & Microelectron., Fac. of Sci. of Monastir, Monastir, Tunisia
fYear :
2014
Firstpage :
169
Lastpage :
173
Abstract :
In this paper, we aim at presenting a detailed classification of the most known authentication protocols using quantum means with calculation of quantum communication complexity. The Quantum Key Distribution protocols were basically proposed to establish secret keys that will be used later for encrypting and decrypting messages. Practically, QKD protocols are vulnerable against the men-in-middle attack. Thereby, in order to prevent masquerading any legitimate user and tampering with the communication, QKD schemes need authentication prior to communication. Many quantum authentication protocols have been proposed in the literature. Each one has a particular approach to authenticate the communicators. We attempt in the present work to introduce the various ways of quantum authentication and to classify them according to some specific criteria with a calculation of the quantum communication complexity.
Keywords :
communication complexity; cryptographic protocols; message authentication; private key cryptography; quantum cryptography; QKD protocols; men-in-middle attack; message decryption; message encryption; quantum authentication protocol classification; quantum communication complexity; quantum key distribution protocols; secret keys; Authentication; Complexity theory; Cryptography; Protocols; Quantum entanglement; Servers; Bell States; Entanglement; QKD; Quantum authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2014 15th International Conference on
Type :
conf
DOI :
10.1109/STA.2014.7086669
Filename :
7086669
Link To Document :
بازگشت