A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
From MaRDI portal
Publication:4663299
DOI10.1142/S0219749905000797zbMath1066.94015arXivquant-ph/0407131WikidataQ59468097 ScholiaQ59468097MaRDI QIDQ4663299
No author found.
Publication date: 30 March 2005
Published in: International Journal of Quantum Information (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0407131
Quantum computation (81P68) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Related Items (6)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ The Case for Quantum Key Distribution ⋮ RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'" ⋮ VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY" ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Cites Work
This page was built for publication: A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY