{"title":"通过量子信道使用循环矩阵和逻辑映射共享密钥","authors":"A. Salah, B. Benzeghli, L. Noui","doi":"10.37418/amsj.11.12.13","DOIUrl":null,"url":null,"abstract":"To ensure confidentiality and avoid humain attacks against our data, we exchange encryption and decryption keys. In our proposal scheme, we use the commutative properties of the product of circular matrices to create a common encryption key by applying the protocol of { \\it Diffie-Hellman} exchange through a classic channel. To raise the security level of our system we have introduced the sensibility of chaotic logistic maps in another exchange protocol which is the $BB84$ throuth a quantum channal.","PeriodicalId":231117,"journal":{"name":"Advances in Mathematics: Scientific Journal","volume":"127 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SHARING KEYS USING CIRCULANT MATRICES AND LOGISTIC MAPS THROUGH QUANTUM CHANNAL\",\"authors\":\"A. Salah, B. Benzeghli, L. Noui\",\"doi\":\"10.37418/amsj.11.12.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To ensure confidentiality and avoid humain attacks against our data, we exchange encryption and decryption keys. In our proposal scheme, we use the commutative properties of the product of circular matrices to create a common encryption key by applying the protocol of { \\\\it Diffie-Hellman} exchange through a classic channel. To raise the security level of our system we have introduced the sensibility of chaotic logistic maps in another exchange protocol which is the $BB84$ throuth a quantum channal.\",\"PeriodicalId\":231117,\"journal\":{\"name\":\"Advances in Mathematics: Scientific Journal\",\"volume\":\"127 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Mathematics: Scientific Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37418/amsj.11.12.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Mathematics: Scientific Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37418/amsj.11.12.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SHARING KEYS USING CIRCULANT MATRICES AND LOGISTIC MAPS THROUGH QUANTUM CHANNAL
To ensure confidentiality and avoid humain attacks against our data, we exchange encryption and decryption keys. In our proposal scheme, we use the commutative properties of the product of circular matrices to create a common encryption key by applying the protocol of { \it Diffie-Hellman} exchange through a classic channel. To raise the security level of our system we have introduced the sensibility of chaotic logistic maps in another exchange protocol which is the $BB84$ throuth a quantum channal.