scholarly journals Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes

Author(s):  
Felix Günther ◽  
Bertram Poettering
Author(s):  
Gregory Paperin

In this article we aim to analyze some of the advances in security of communication since this discipline evolved and to pinpoint the main problems. We then introduce a modern attempt to solve some of these problems, in particular the key distribution problem, by using the theory of quantum mechanics to construct a communication system that automatically detects eavesdropping. We examine some of the implications of quantum mechanics relevant to this field and then introduce a selection of communication protocols based on them. Finally we examine how secure these protocols are and identify their potential weaknesses.


2005 ◽  
Vol 5 (7) ◽  
pp. 551-560
Author(s):  
D. R. Kuhn

This paper presents a server-based hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. A novel feature of the protocol is that it can detect a compromised server. Additional advantages are that it avoids the requirement for timestamps used in classical protocols, guarantees that the trusted server cannot know the authentication key, can provide resistance to multiple photon attacks, and can be used with BB84 or other quantum key distribution protocols. Each resource shares a previously distributed secret key with the trusted server, and resources can communicate with the server using both classical and quantum channels. Resources do not share secret keys with each other, so that the key distribution problem for the network is reduced from O(n^2) to O(n).


Author(s):  
Ik Rae JEONG ◽  
Jeong Ok KWON ◽  
Dong Hoon LEE
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document