Abstract
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomo- naco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for quantum key distribution that does authentication by quantum means only. Although a classical channel is still used, there is no need for the channel to be authenticated. The algorithm relies on two protected public keys to authenticate the communication partner.
This research was supported by the Natural Sciences and Engineering Research Council of Canada.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters 68(21), 3121–3124 (1992)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (December 1984)
Bennett, C.H., Brassard, G., Mermin, D.N.: Quantum cryptography without Bell’s theorem. Physical Review Letters 68(5), 557–559 (1992)
Ekert, A.: Quantum cryptography based on Bell’s theorem. Physical Review Letters 67, 661–663 (1991)
Nagy, M., Akl, S.G.: Quantum key distribution revisited. Technical Report 2006-516, School of Computing, Queen’s University, Kingston, Ontario (June 2006)
Nagy, N., Akl, S.G.: Authenticated quantum key distribution without classical communication. In: Workshop on Unconventional Computational Problems, Sixth International Conference on Unconventional Computation, Kingston, Ontario (August 2007)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK (2000)
Lomonaco, Jr., S.J.: A Talk on Quantum Cryptography or How Alice Outwits Eve. In: Proceedings of Symposia in Applied Mathematics, vol. 58, pp. 237–264. Washington, DC (January 2002)
Shi, B.-S., Li, J., Liu, J.-M., Fan, X.-F., Guo, G.-C.: Quantum key distribution and quantum authentication based on entangled states. Physics Letters A 281(2-3), 83–87 (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nagy, N., Akl, S.G. (2007). Quantum Authenticated Key Distribution. In: Akl, S.G., Calude, C.S., Dinneen, M.J., Rozenberg, G., Wareham, H.T. (eds) Unconventional Computation. UC 2007. Lecture Notes in Computer Science, vol 4618. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73554-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-73554-0_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73553-3
Online ISBN: 978-3-540-73554-0
eBook Packages: Computer ScienceComputer Science (R0)