{"title":"On Assisted Quantum Key Authentication Protocol","authors":"Supriyo Banerjee, B. Maiti, Banani Saha","doi":"10.1109/ICOEI51242.2021.9453009","DOIUrl":null,"url":null,"abstract":"This paper has developed a quantum authentication protocol along with the encryption encapsulation by entangled photon states that are forwarded from a trusted server to two users. It is shown to provide second tier security against impersonation and eavesdropping but with the ease of decryption limited only for two legitimate users. In this process, qutrit photon states are used to identity encryption and a one-way-function containing the phase information of the trits is used for basis selection. The protocol is analyzed to test different eavesdropping strategies and is found to provide unconditional security.","PeriodicalId":420826,"journal":{"name":"2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 5th International Conference on Trends in Electronics and Informatics (ICOEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI51242.2021.9453009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper has developed a quantum authentication protocol along with the encryption encapsulation by entangled photon states that are forwarded from a trusted server to two users. It is shown to provide second tier security against impersonation and eavesdropping but with the ease of decryption limited only for two legitimate users. In this process, qutrit photon states are used to identity encryption and a one-way-function containing the phase information of the trits is used for basis selection. The protocol is analyzed to test different eavesdropping strategies and is found to provide unconditional security.