Man-in-the-middle attack on quantum secure communications with authentication.
Tzu-Han LinTzonelih HwangPublished in: Quantum Inf. Process. (2014)
Keyphrases
- user authentication
- authentication mechanism
- authentication scheme
- password authentication
- identity management
- key distribution
- authentication protocol
- data encryption
- factor authentication
- group communication
- security mechanisms
- security requirements
- security analysis
- secure manner
- integrity verification
- secure communication
- rights management
- public key
- key management
- security services
- smart card
- quantum computation
- public key cryptography
- identity authentication
- quantum computing
- electronic payment
- key exchange protocol
- public key encryption
- cloud computing
- public key infrastructure
- encryption decryption
- mutual authentication
- information sharing
- key agreement protocol
- trusted third party
- private key
- security level
- security protocols
- resource constrained
- secret key
- communication systems
- communication networks
- quantum mechanics
- biometric authentication
- cryptographic protocols
- encryption scheme
- security issues
- probability ranking principle
- information security