Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing ke...
Main Authors: | Majeed, Mohammed Munther A, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M. |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/5437/ http://irep.iium.edu.my/5437/ http://irep.iium.edu.my/5437/ http://irep.iium.edu.my/5437/1/jcs6101123-1129.pdf |
Similar Items
-
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014) -
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)