메뉴 건너뛰기




Volumn 11, Issue 4, 2016, Pages 213-223

A quantum Diffie-Hellman protocol

Author keywords

Key exchange algorithm; Perfect secrecy; Quantum Diffie Hellman

Indexed keywords

COMPUTER NETWORKS; ELECTRICAL ENGINEERING; NETWORK SECURITY;

EID: 84989854376     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2016.079277     Document Type: Conference Paper
Times cited : (5)

References (27)
  • 1
    • 33746794167 scopus 로고    scopus 로고
    • Experimentally realizable quantum comparison of coherent states and its applications
    • Andersson, E., Curty, M. and Jex, I. (2006) 'Experimentally realizable quantum comparison of coherent states and its applications', Phys. Rev. A, Vol. 74, pp.022304.
    • (2006) Phys. Rev. A , vol.74 , pp. 022304
    • Andersson, E.1    Curty, M.2    Jex, I.3
  • 4
    • 84869460741 scopus 로고    scopus 로고
    • Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light
    • Article number 1174
    • Clarke, P.J., Collins, R.J., Dunjko, V., Andersson, E., Jeffers, J. and Buller, G.S. (2012) 'Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light', Nature Communications, Vol. 3, Article number 1174.
    • (2012) Nature Communications , vol.3
    • Clarke, P.J.1    Collins, R.J.2    Dunjko, V.3    Andersson, E.4    Jeffers, J.5    Buller, G.S.6
  • 5
    • 0017018484 scopus 로고    scopus 로고
    • New directions incryptography
    • Diffie, W. and Hellman, M. (2006) 'New directions incryptography', IEEE Trans. Inf. Theor., Vol. 22, No. 6, pp.644-654.
    • (2006) IEEE Trans. Inf. Theor. , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 6
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • Diffie, W., Van Oorschot, P.C. and Wiener, M.J. (1992) 'Authentication and authenticated key exchanges', Des. Codes Cryptography, Vol. 2, No. 2, pp.107-125.
    • (1992) Des. Codes Cryptography , vol.2 , Issue.2 , pp. 107-125
    • Diffie, W.1    Van Oorschot, P.C.2    Wiener, M.J.3
  • 7
    • 0343152990 scopus 로고
    • Quantum cryptography basedon bell's theorem
    • Ekert, A.K. (1991) 'Quantum cryptography basedon bell's theorem', Phys. Rev. Lett., Vol. 67, pp.661-663.
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 10
    • 0018036292 scopus 로고
    • An overview of public key cryptography
    • Hellman, M. (1978) 'An overview of public key cryptography', Communications Society Magazine, IEEE, Vol. 16, No. 6, pp.24-32.
    • (1978) Communications Society Magazine, IEEE , vol.16 , Issue.6 , pp. 24-32
    • Hellman, M.1
  • 11
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • Hwang, W-Y. (2003) 'Quantum key distribution with high loss: toward global secure communication', Phys. Rev. Lett., Vol. 91, pp.057901.
    • (2003) Phys. Rev. Lett. , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 12
    • 33646470713 scopus 로고    scopus 로고
    • A three-stage quantum cryptography protocol
    • Kak, S. (2006) 'A three-stage quantum cryptography protocol', Foundations of Physics Letters, Vol. 19, No. 3, pp.293-296.
    • (2006) Foundations of Physics Letters , vol.19 , Issue.3 , pp. 293-296
    • Kak, S.1
  • 13
    • 74849116818 scopus 로고    scopus 로고
    • K08: A generalized bb84/b92 protocol in quantum cryptography
    • Kartalopoulos, S.V. (2009) 'K08: a generalized bb84/b92 protocol in quantum cryptography', Security and Communication Networks, Vol. 2, No. 6, pp.686-693.
    • (2009) Security and Communication Networks , vol.2 , Issue.6 , pp. 686-693
    • Kartalopoulos, S.V.1
  • 16
    • 84915803625 scopus 로고    scopus 로고
    • Quantum key distribution based on selective post-processing in passive optical networks
    • Martinez-Mateo, J., Ciurana, A. and Martin, V. (2014) 'Quantum key distribution based on selective post-processing in passive optical networks', Photonics Technology Letters, IEEE, Vol. 26, No. 9, pp.881-884.
    • (2014) Photonics Technology Letters, IEEE , vol.26 , Issue.9 , pp. 881-884
    • Martinez-Mateo, J.1    Ciurana, A.2    Martin, V.3
  • 19
    • 84886305560 scopus 로고    scopus 로고
    • A probabilistic quantum key transfer protocol
    • Parakh, A. (2013) 'A probabilistic quantum key transfer protocol', Security and Communication Networks, Vol. 6, No. 11, pp.1389-1395.
    • (2013) Security and Communication Networks , vol.6 , Issue.11 , pp. 1389-1395
    • Parakh, A.1
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A. and Adleman, L. (1978) 'A method for obtaining digital signatures and public-key cryptosystems', Commun. ACM, Vol. 21, No. 2, pp.120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 1642383816 scopus 로고    scopus 로고
    • Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
    • Scarani, V., Acin, A., Ribordy, G. and Gisin, N. (2004) 'Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations', Phys. Rev. Lett., Vol. 92, pp.057901.
    • (2004) Phys. Rev. Lett. , vol.92 , pp. 057901
    • Scarani, V.1    Acin, A.2    Ribordy, G.3    Gisin, N.4
  • 23
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P.W. (1997) 'Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer', SIAM J. Comput., Vol. 26, No. 5, pp.1484-1509.
    • (1997) SIAM J. Comput. , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.