Skip to main content

Quantum Authenticated Key Distribution

  • Conference paper
Book cover Unconventional Computation (UC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4618))

Included in the following conference series:

Abstract

Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomo- naco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for quantum key distribution that does authentication by quantum means only. Although a classical channel is still used, there is no need for the channel to be authenticated. The algorithm relies on two protected public keys to authenticate the communication partner.

This research was supported by the Natural Sciences and Engineering Research Council of Canada.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters 68(21), 3121–3124 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  2. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (December 1984)

    Google Scholar 

  3. Bennett, C.H., Brassard, G., Mermin, D.N.: Quantum cryptography without Bell’s theorem. Physical Review Letters 68(5), 557–559 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  4. Ekert, A.: Quantum cryptography based on Bell’s theorem. Physical Review Letters 67, 661–663 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  5. Nagy, M., Akl, S.G.: Quantum key distribution revisited. Technical Report 2006-516, School of Computing, Queen’s University, Kingston, Ontario (June 2006)

    Google Scholar 

  6. Nagy, N., Akl, S.G.: Authenticated quantum key distribution without classical communication. In: Workshop on Unconventional Computational Problems, Sixth International Conference on Unconventional Computation, Kingston, Ontario (August 2007)

    Google Scholar 

  7. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK (2000)

    MATH  Google Scholar 

  8. Lomonaco, Jr., S.J.: A Talk on Quantum Cryptography or How Alice Outwits Eve. In: Proceedings of Symposia in Applied Mathematics, vol. 58, pp. 237–264. Washington, DC (January 2002)

    Google Scholar 

  9. Shi, B.-S., Li, J., Liu, J.-M., Fan, X.-F., Guo, G.-C.: Quantum key distribution and quantum authentication based on entangled states. Physics Letters A 281(2-3), 83–87 (2001)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Selim G. Akl Cristian S. Calude Michael J. Dinneen Grzegorz Rozenberg H. Todd Wareham

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nagy, N., Akl, S.G. (2007). Quantum Authenticated Key Distribution. In: Akl, S.G., Calude, C.S., Dinneen, M.J., Rozenberg, G., Wareham, H.T. (eds) Unconventional Computation. UC 2007. Lecture Notes in Computer Science, vol 4618. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73554-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73554-0_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73553-3

  • Online ISBN: 978-3-540-73554-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics