An Optimized, Authenticated Key Distribution Protocol for Optical Channels

In this paper, a key distribution protocol based on the integration of both classical and quantum cryptography is developed. Quantum physics laws ensure detection of eavesdropping over optical channels, while classical cryptography provides convenient techniques that enable efficient user authentication and prevent denial of previous commitments. The proposed scheme is based on the RSA-TBOS signcryption scheme to achieve the combined functionality of a digital signature and encryption in an efficient manner. It therefore offers four security services: privacy, authenticity, data integrity and non-repudiation. The ciphertext is converted to binary bits and then to qubits. The protocol involves a small number of rounds and the number of keys stored at the user side is kept minimal promoting its use in large networks. A comparative study with other schemes in literature revealed that it represents a remarkably good trade-off between the storage as well as bandwidth requirements and the security services offered.

[1]  Jin Mao-shun An authenticated key distribution scheme , 2002 .

[2]  Liju Chen,et al.  Quantum authentication protocol using Bell states , 2007 .

[3]  Fibirova Jana,et al.  Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .

[4]  Zhengjun Cao,et al.  Improvement of one quantum encryption scheme , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[5]  D. Bouwmeester,et al.  The Physics of Quantum Information , 2000 .

[6]  Gao ZhiMin,et al.  A Novel Key Assignment Algorithms for Secure Multicast , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[7]  Seong-Moo Yoo,et al.  On quantum authentication protocols , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[8]  Sellami Ali,et al.  Quantum key distribution protocols , 2011 .

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[11]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[12]  Wenbo Mao,et al.  Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.