GSIS / CIST Hwa Yean Lee 2005. 2. 21. Authenticated QKD protocol using one-time ID. Contents. Introduction Authentication with one-time ID Quantum Key distribution Security proof Conclusion. 1. Introduction. QKD (Quantum Key Distribution) protocols Advantage
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Hwa Yean Lee
2005. 2. 21
: Unconditional security
: Vulnerability to the Man-in-the middle attack
: secret user and one-way function
where is a count.
where is Alice’s authentication key
and is Bob’s.
Eve4. Security proof
with probability ¼
for each check bit
in the authentication
the hash function,
Eve can estimate only
some bits of hashed value.
the probability of detection is 3/8.
the probability of detection is 7/16.
More research on this problem are needed.