Skip to main content

2019 | OriginalPaper | Buchkapitel

6. The Multi-stage Protocol

verfasst von : Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan

Erschienen in: Multi-photon Quantum Secure Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter generalizes the three-stage protocol into a family of multi-stage protocols. It compares the multi-stage protocol with single-photon protocols and illustrates how a multi-photon protocol can be made secure against man-in-the-middle attack. Since a multi-photon protocol is, in general, subject to photon-siphoning attacks, the protocol introduces another variable to thwart such attacks. Parts of this chapter are based on the authors’ work previously reported in [13].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2013 (pp. 1803–1807). El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2013 (pp. 1803–1807).
2.
Zurück zum Zitat Punekar, N. V. (2013). Implementation of the three-stage protocol over optical fiber (Masters thesis). University of oklahoma Tulsa. Punekar, N. V. (2013). Implementation of the three-stage protocol over optical fiber (Masters thesis). University of oklahoma Tulsa.
3.
Zurück zum Zitat El Rifai, M., Chan, K. W. C., & Verma, P. K. (2015). Multi-stage quantum secure communication using polarization hoppng. Security and Communication Networks. El Rifai, M., Chan, K. W. C., & Verma, P. K. (2015). Multi-stage quantum secure communication using polarization hoppng. Security and Communication Networks.
4.
Zurück zum Zitat Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121.MathSciNetCrossRef Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121.MathSciNetCrossRef
5.
Zurück zum Zitat Jin, D., Verma, P. K., & Kartalopoulos, S. V. (2009). Fast convergent key distribution algorithms using a dual quantum channel. Security and Communication Networks, 2(6), 519–530. Jin, D., Verma, P. K., & Kartalopoulos, S. V. (2009). Fast convergent key distribution algorithms using a dual quantum channel. Security and Communication Networks, 2(6), 519–530.
6.
Zurück zum Zitat Parakh, A. (2013). A probabilistic quantum key transfer protocol. Security and Communication Networks, 6(11), 1389–1395.CrossRef Parakh, A. (2013). A probabilistic quantum key transfer protocol. Security and Communication Networks, 6(11), 1389–1395.CrossRef
7.
Zurück zum Zitat Zamani, F., & Verma, P. K. (2011). A QKD protocol with a two-way quantum channel. In 2011 IEEE 5th International Conference on Advanced Networks and Telecommunication Systems (ANTS) (pp. 1–6). Zamani, F., & Verma, P. K. (2011). A QKD protocol with a two-way quantum channel. In 2011 IEEE 5th International Conference on Advanced Networks and Telecommunication Systems (ANTS) (pp. 1–6).
8.
Zurück zum Zitat Fung, C.-H. F., Tamaki, K., & Lo, H.-K. (2006). Performance of two quantum-key-distribution protocols. Physical Review A, 73(1), 012337.CrossRef Fung, C.-H. F., Tamaki, K., & Lo, H.-K. (2006). Performance of two quantum-key-distribution protocols. Physical Review A, 73(1), 012337.CrossRef
9.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301.CrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301.CrossRef
10.
Zurück zum Zitat Lo, H.-K., Curty, M., & Tamaki, K. (2014). Secure quantum key distribution. Nature Photonics, 8(8), 595–604.CrossRef Lo, H.-K., Curty, M., & Tamaki, K. (2014). Secure quantum key distribution. Nature Photonics, 8(8), 595–604.CrossRef
11.
Zurück zum Zitat Barbosa, G. A., Corndorf, E., Kumar, P., & Yuen, H. P. (2003). Secure communication using mesoscopic coherent states. Physical Review Letters, 90(22), 227901.CrossRef Barbosa, G. A., Corndorf, E., Kumar, P., & Yuen, H. P. (2003). Secure communication using mesoscopic coherent states. Physical Review Letters, 90(22), 227901.CrossRef
12.
Zurück zum Zitat Barbosa, G. A., & van de Graaf, J. (2014). Untappable communication channels over optical fibers from quantum-optical noise. IACR Cryptology ePrint Archive, 2014, 146. Barbosa, G. A., & van de Graaf, J. (2014). Untappable communication channels over optical fibers from quantum-optical noise. IACR Cryptology ePrint Archive, 2014, 146.
13.
Zurück zum Zitat Kak, S. (2006). A three-stage quantum cryptography protocol. Foundations of Physics Letters, 19(3), 293–296.MathSciNetCrossRef Kak, S. (2006). A three-stage quantum cryptography protocol. Foundations of Physics Letters, 19(3), 293–296.MathSciNetCrossRef
14.
Zurück zum Zitat Mandal, S., et al. (2012). Implementation of secure quantum protocol using multiple photons for communication arXiv preprint arXiv:1208.6198. Mandal, S., et al. (2012). Implementation of secure quantum protocol using multiple photons for communication arXiv preprint arXiv:​1208.​6198.
15.
Zurück zum Zitat Mandal, S. (2012). Implementation of the three-stage protocol over free space optics. University of Oklahoma. Mandal, S. (2012). Implementation of the three-stage protocol over free space optics. University of Oklahoma.
18.
Zurück zum Zitat Svozil, K. (2005). Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography (Vol. 3, No. 4, pp. 654). Svozil, K. (2005). Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography (Vol. 3, No. 4, pp. 654).
21.
Zurück zum Zitat Punekar, N., Darunkar, B., & Verma, P. (2016, February 13). Secured optical fiber communication using polarization restoration technique and channel characterization. In Proceedings of SPIE 9774, Next-Generation Optical Communication: Components, Sub-Systems, and Systems V (97740F). Punekar, N., Darunkar, B., & Verma, P. (2016, February 13). Secured optical fiber communication using polarization restoration technique and channel characterization. In Proceedings of SPIE 9774, Next-Generation Optical Communication: Components, Sub-Systems, and Systems V (97740F).
Metadaten
Titel
The Multi-stage Protocol
verfasst von
Pramode K. Verma
Mayssaa El Rifai
Kam Wai Clifford Chan
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8618-2_6

Neuer Inhalt