Increasing the security of the ping-pong protocol by using many mutually unbiased bases.
Piotr ZawadzkiZbigniew PuchalaJaroslaw Adam MiszczakPublished in: Quantum Inf. Process. (2013)
Keyphrases
- ping pong
- cryptographic protocols
- security protocols
- authentication protocol
- key agreement protocol
- key exchange protocol
- security properties
- security model
- denial of service attacks
- mobile payment
- access control
- security services
- rfid systems
- communication protocols
- key distribution
- blind signature scheme
- secure multiparty computation
- security analysis
- key exchange
- provably secure
- information security
- diffie hellman
- mutual authentication
- cryptographic algorithms
- secure routing
- ban logic
- formal analysis
- security policies
- trust negotiation
- lightweight
- network security
- key establishment
- medium access control
- security issues
- security requirements
- trusted third party
- public key
- security mechanisms
- communication protocol
- blind signature
- rfid tags
- security threats
- network management
- statistical databases
- scalar product
- smart card