Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
Partha BasuchowdhuriPublished in: CoRR (2007)
Keyphrases
- authentication protocol
- security analysis
- key distribution
- smart card
- lightweight
- password authentication
- key agreement protocol
- formal analysis
- public key
- user authentication
- cryptographic protocols
- authentication scheme
- mutual authentication
- ban logic
- quantum computing
- virtual private network
- security requirements
- security protocols
- control architecture
- security properties
- wireless local area network
- key agreement