MY145389A - A secure key distribution protocol based on hash functions utilizing quantum authentications channel (kdp-6dp) - Google Patents
A secure key distribution protocol based on hash functions utilizing quantum authentications channel (kdp-6dp)Info
- Publication number
- MY145389A MY145389A MYPI20094827A MY145389A MY 145389 A MY145389 A MY 145389A MY PI20094827 A MYPI20094827 A MY PI20094827A MY 145389 A MY145389 A MY 145389A
- Authority
- MY
- Malaysia
- Prior art keywords
- quantum
- hash functions
- secure key
- kdp
- channel
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Optical Communication System (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A METHOD FOR A SECURE KEY DISTRIBUTION PROTOCOL BASED ON HASH FUNCTIONS UTILIZING QUANTUM AUTHENTICATION CHANNEL (KDP-6DP) (200), COMPRISING AUTHENTICATING (210) A RECEIVER USING QUANTUM AUTHENTICATION CHANNEL AND DISTRIBUTING (220) SECURE KEY FROM SENDER TO THE RECEIVER BY ENCRYPTING MESSAGE USING HASH FUNCTIONS (222). AUTHENTICATING THE RECEIVER USING QUANTUM AUTHENTICATION CHANNEL FURTHER COMPRISES PREPARING SIX QUANTUM STATES AT A SENDER (212), SENDING TWO QUANTUM STATES TO THE RECEIVER (214), FLIPPING THE QUANTUM STATES AT THE RECEIVER (216), SENDING BACK THE FLIPPED QUANTUM STATES TO THE SENDER (216), AND VALIDATING THE QUANTUM STATES AT THE SENDER (218).
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20094827 MY145389A (en) | 2009-11-13 | 2009-11-13 | A secure key distribution protocol based on hash functions utilizing quantum authentications channel (kdp-6dp) |
PCT/MY2010/000190 WO2011059306A2 (en) | 2009-11-13 | 2010-09-30 | A secure key distribution protocol based on hash functions utilizing quantum authentication channel (kdp-6dp) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20094827 MY145389A (en) | 2009-11-13 | 2009-11-13 | A secure key distribution protocol based on hash functions utilizing quantum authentications channel (kdp-6dp) |
Publications (1)
Publication Number | Publication Date |
---|---|
MY145389A true MY145389A (en) | 2012-01-26 |
Family
ID=43992271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI20094827 MY145389A (en) | 2009-11-13 | 2009-11-13 | A secure key distribution protocol based on hash functions utilizing quantum authentications channel (kdp-6dp) |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY145389A (en) |
WO (1) | WO2011059306A2 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411521B (en) | 2015-07-31 | 2020-02-18 | 阿里巴巴集团控股有限公司 | Identity authentication method, device and system for quantum key distribution process |
CN105471584B (en) * | 2015-12-04 | 2019-02-22 | 长春大学 | A kind of identity identifying method based on quantum key encryption |
CN108768646B (en) * | 2018-08-03 | 2022-05-27 | 浙江九州量子信息技术股份有限公司 | QKD authentication method based on quantum security key |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7298847B2 (en) * | 2002-02-07 | 2007-11-20 | Nokia Inc. | Secure key distribution protocol in AAA for mobile IP |
US8761401B2 (en) * | 2006-08-28 | 2014-06-24 | Motorola Mobility Llc | System and method for secure key distribution to manufactured products |
-
2009
- 2009-11-13 MY MYPI20094827 patent/MY145389A/en unknown
-
2010
- 2010-09-30 WO PCT/MY2010/000190 patent/WO2011059306A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2011059306A2 (en) | 2011-05-19 |
WO2011059306A3 (en) | 2011-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008087734A1 (en) | Cryptogram generating device, cryptogram communication system, and group parameter generating device | |
MX2009003684A (en) | Method and apparatus for mutual authentication. | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
WO2008080800A3 (en) | Securing communication | |
WO2014059136A3 (en) | Techniqued for secure data exchange | |
EP2120389A4 (en) | A method, system and communication device for generating session cryptographic | |
GB2494062B (en) | Secure wireless link between two devices using probes | |
SG10201803986RA (en) | Method and system for secure transmission of remote notification service messages to mobile devices without secure elements | |
WO2007075156A3 (en) | Cryptography related to keys | |
WO2010010336A3 (en) | Mulitipad encryption | |
GB201016672D0 (en) | Secure exchange/authentication of electronic documents | |
WO2007081810A3 (en) | Securing network traffic using distributed key generation and dissemination over secure tunnels | |
WO2010068779A3 (en) | Trust establishment from forward link only to non-forward link only devices | |
WO2009035283A3 (en) | Secure signing method, secure authentication method and iptv system | |
WO2011017099A3 (en) | Secure communication using asymmetric cryptography and light-weight certificates | |
WO2008042175A3 (en) | Key wrapping system and method using encryption | |
WO2013032671A4 (en) | Methods and apparatus for source authentication of messages that are secured with a group key | |
WO2007011991A3 (en) | Hybrid symmetric/asymmetric cryptography with user authentication | |
TW200733686A (en) | Asynchronous encryption for secured electronic communications | |
SG143152A1 (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
EP3799349A3 (en) | Communicating securely with devices in a distributed control system | |
WO2012092072A3 (en) | System and method for mutually authenticated cryptographic key exchange using matrices | |
IN2014KN02750A (en) | ||
EP2398208A3 (en) | Method for securing transmission data and security system for implementing the same |