Abstract
In 1984 Bennett and Brassard proposed a Quantum Key Distribution (QKD) protocol known as BB84 protocol to distribute a random and frequently changed key using quantum mechanism. A major problem in this Protocol is to prove authentication. One of a solution of this problem has already been proposed in [4]. But in presence of Hardware Fault or Interception, above protocol is not applicable. In This paper Proposed System, Key Distillation has been added to overcome Hardware Fault or Interception with minor changes were not available in [4] and was available in original algorithm. It may increase performance of the Proposed System.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cobourne, S.: Quantum key distribution protocols and applications (2011). http://www.ma.rhul.ac.uk/static/techrep/2011/RHUL-MA-2011-05.pdf
Implementation of the BB84 QKD Protocol. http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/bb84prot.html
Shaikh, A.M., Shah, P.D.: BB84 and identity based encryption based a novel symmetric key distribution algorithm. ARTCom2013 (2013)
http://www.maths.surrey.ac.uk/hosted-sites/R.Knott/Fibonacci/lucasNbs.html
Scharitzer, G.: Basic quantum cryptography. Version 0.9, Vienna University of Technology Institute of Automation (2003)
Acknowledgement
We Express our Auspicious thank to ARTCom2013 conference who has motivated us to think extra on our previous proposed system by selecting our paper as an extended paper. And we have never worked with QKD hardware so whether this combination is going to work or not that we can’t answer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Shaikh, A.M., Shah, P.D. (2018). Extended BB84 Protocol Using Lucas Series and Identity Based Encryption. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-63673-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63672-6
Online ISBN: 978-3-319-63673-3
eBook Packages: EngineeringEngineering (R0)