메뉴 건너뛰기




Volumn 4, Issue 1, 2007, Pages 71-80

Provably secure three-party authenticated quantum key distribution protocols

Author keywords

Provable security; Quantum cryptography; Three party key distribution protocol

Indexed keywords

AUTHENTICATION; DATA TRANSFER; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33847744655     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2007.13     Document Type: Article
Times cited : (85)

References (26)
  • 1
    • 0029543006 scopus 로고
    • Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations
    • G. Li, "Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations," Distributed Computing, vol. 9, no. 3, pp. 131-145, 1995.
    • (1995) Distributed Computing , vol.9 , Issue.3 , pp. 131-145
    • Li, G.1
  • 2
    • 0002494222 scopus 로고
    • A Nonce-Based Protocol for Multiple Authentications
    • A. Kehne, J. Schonwalder, and H. Langendorfer, "A Nonce-Based Protocol for Multiple Authentications," ACM Operating Systems Rev., vol. 26, no. 4, pp. 84-89, 1992.
    • (1992) ACM Operating Systems Rev , vol.26 , Issue.4 , pp. 84-89
    • Kehne, A.1    Schonwalder, J.2    Langendorfer, H.3
  • 5
    • 21644467750 scopus 로고    scopus 로고
    • A Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairing
    • H.A. Wen, T.F. Lee, and T. Hwang, "A Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairing," IEE Proc. Comm., vol. 152, no. 2, pp. 138-143, 2005.
    • (2005) IEE Proc. Comm , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 6
    • 1642330512 scopus 로고
    • The Evolution of the Kerberos Authentication Service
    • J.T. Kohl, "The Evolution of the Kerberos Authentication Service," EurOpen Conf. Proc., pp. 295-313, 1991.
    • (1991) EurOpen Conf. Proc , pp. 295-313
    • Kohl, J.T.1
  • 7
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • B. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm., vol. 32, no. 9, pp. 33-38, 1994.
    • (1994) IEEE Comm , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'o, T.2
  • 12
    • 11944254075 scopus 로고
    • Quantum Cryptography Using any Two Nonorthogonal States
    • C.H. Bennett, "Quantum Cryptography Using any Two Nonorthogonal States," Physical Rev. Letters, vol. 68, no. 3121, 1992.
    • (1992) Physical Rev. Letters , vol.68 , Issue.3121
    • Bennett, C.H.1
  • 13
    • 0343152990 scopus 로고
    • Quantum Cryptography Based on Bell's Theorem
    • A.K. Ekert, "Quantum Cryptography Based on Bell's Theorem," Physical Rev. Letters, vol. 67, no. 661, 1991.
    • (1991) Physical Rev. Letters , vol.67 , Issue.661
    • Ekert, A.K.1
  • 14
    • 0041782433 scopus 로고    scopus 로고
    • Quantum Cryptography without Public Announcement of Bases
    • W.Y. Hwang, I.G. Koh, and Y.D. Han, "Quantum Cryptography without Public Announcement of Bases," Physics Letters A, vol. 244, pp. 489-494, 1998.
    • (1998) Physics Letters A , vol.244 , pp. 489-494
    • Hwang, W.Y.1    Koh, I.G.2    Han, Y.D.3
  • 15
    • 0006375145 scopus 로고    scopus 로고
    • Identity Verification in Quantum Key Distribution
    • G. Zeng and W. Zhang, "Identity Verification in Quantum Key Distribution," Physical Rev. A, vol. 61, 2000.
    • (2000) Physical Rev. A , vol.61
    • Zeng, G.1    Zhang, W.2
  • 16
    • 84955621476 scopus 로고    scopus 로고
    • Quantum Key Distribution and String Oblivious Transfer in Noisy Channel
    • D. Mayers, "Quantum Key Distribution and String Oblivious Transfer in Noisy Channel," Proc. Advances in Cryptology (CRYPTO '96), pp. 343-357, 1996.
    • (1996) Proc. Advances in Cryptology (CRYPTO '96) , pp. 343-357
    • Mayers, D.1
  • 17
    • 0037319628 scopus 로고    scopus 로고
    • Proof of Security of Quantum Key Distribution with Two-Way Classical Communications
    • D. Gottesman and H.-K. Lo, "Proof of Security of Quantum Key Distribution with Two-Way Classical Communications," IEEE Trans. Information Theory, vol. 49, p. 457, 2003.
    • (2003) IEEE Trans. Information Theory , vol.49 , pp. 457
    • Gottesman, D.1    Lo, H.-K.2
  • 19
    • 0028428439 scopus 로고
    • Secure Key Distribution System Based on Quantum Cryptography
    • P.D. Townsend, "Secure Key Distribution System Based on Quantum Cryptography," Electronics Letters, vol. 30, pp. 809-811, 1994.
    • (1994) Electronics Letters , vol.30 , pp. 809-811
    • Townsend, P.D.1
  • 22
    • 33947385649 scopus 로고
    • Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
    • A. Einstein, P. Podolsky, and S. Rosen, "Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?" Physical Rev., vol. 47, pp. 777-780, 1935.
    • (1935) Physical Rev , vol.47 , pp. 777-780
    • Einstein, A.1    Podolsky, P.2    Rosen, S.3
  • 24
    • 33746708860 scopus 로고
    • A Single Quantum Cannot Be Cloned
    • W.K. Wootters and W.H. Zurek, "A Single Quantum Cannot Be Cloned," Nature, vol. 299, pp. 802-803, 1992.
    • (1992) Nature , vol.299 , pp. 802-803
    • Wootters, W.K.1    Zurek, W.H.2
  • 26
    • 33644748254 scopus 로고    scopus 로고
    • Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients
    • H.-A. Wen, C.-L. Lin, and T. Hwang, "Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients," Computers and Security, vol. 25, pp. 106-113, 2006.
    • (2006) Computers and Security , vol.25 , pp. 106-113
    • Wen, H.-A.1    Lin, C.-L.2    Hwang, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.