Authentication method, apparatus and system used in quantum key distribution process

作者: Yingfang Fu

DOI:

关键词: AuthenticationDenial-of-service attackQuantum key distributionSpoofing attackKey (cryptography)TransmitterQuantum stateComputer scienceProcess (computing)Computer network

摘要: The present application discloses an authentication method used in a QKD process, and further additional methods corresponding apparatuses, as well system. comprises: selecting, by transmitter according to basis selection rule, of preparation for information that is generated with first pre-provisioned algorithm varies dynamically, transmitting quantum states containing key the information; measuring, receiver, ending process if measurement result inconsistent calculated algorithm. By means this technical solution, dynamic requestor can be achieved defense provided against spoofing attacks, man-in-the-middle attacks distributed denial service (DDoS) security improved; furthermore, waste resources avoided well.

参考文章(102)
Robert Anderson Malaney, Location verification in quantum communications ,(2010)
Alexander Reznik, Prabhakar R. Chitrapu, Gregory S. Sternberg, Robert A. Difazio, Louis J. Guccione, Debashish Purkayastha, Robert Lind Olesen, Akinlolu Oloruntosi Kumoluyi, Yogendra C. Shah, Tanbir Haque, Inhyok Cha, Guodong Zhang, Leonid Kazakevich, Kazimierz Siwiak, Rajat Pritam Mukherjee, Alain Charles Louis Briancon, Steven Jeffrey Goldberg, Alan Gerald Carlton, Marian Rudolf, Shamin Akbar Rahman, Authentication and encryption methods using shared secret randomness in a joint channel ,(2006)
Laurence R. Lipstone, William Crowder, Lewis Robert Varney, Andrew Swart, Christopher Newton, Automated learning of peering policies for popularity driven replication in content delivery framework ,(2014)
Tammy Lee McGee, Steven James McGee, Heart beacon cycle ,(2012)
Sharipah Binti Satapa, Mohd. Aminudin Bin Mohd. Khalid, Method of integrating quantum key distribution with internet key exchange protocol ,(2009)