Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol

Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing ke...

Full description

Bibliographic Details
Main Authors: Majeed, Mohammed Munther A., Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.
Format: Article
Language:English
Published: Science Publications 2010
Subjects:
Online Access:http://irep.iium.edu.my/5622/
http://irep.iium.edu.my/5622/
http://irep.iium.edu.my/5622/1/Protocol_of_Secure_Key_Distribution_Using_Hash_Functions_and_Quantum.pdf