Corpus ID: 15050533

Defeating Man-inthe-Middle Attack in Quantum Key Distribution

@inproceedings{Faraj2006DefeatingMA,
  title={Defeating Man-inthe-Middle Attack in Quantum Key Distribution},
  author={S. T. Faraj},
  year={2006}
}
  • S. T. Faraj
  • Published 2006
  • Quantum cryptosystems use some properties of quantum mechanics to create secret shared cryptographic keys that remain secret even against an eavesdropper with an access to unlimited computational power. All quantum key distribution (QKD) protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from this point of view, emphasizing the necessity and sufficiency of using unconditionally secure… CONTINUE READING

    Figures from this paper.

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 20 REFERENCES
    Quantum cryptography: Public key distribution and coin tossing
    • 4,061
    • Open Access
    Quantum Cryptography
    • 1,397
    • Open Access
    Proof of security of quantum key distribution with two-way classical communications
    • 238
    • Highly Influential
    • Open Access
    Experimental Quantum Cryptography
    • 1,157
    • Open Access
    A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
    • 27
    • Open Access
    Estimates for practical quantum cryptography
    • 81
    • Open Access
    Unconditional security in quantum cryptography
    • 780
    • Highly Influential
    • Open Access
    Fast, efficient error reconciliation for quantum cryptography
    • 139
    • Open Access
    Quantum cryptographic key distribution in multiple-access networks
    • 2
    Secret-Key Reconciliation by Public Discussion
    • 687
    • Open Access