A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, Baokang | - |
dc.contributor.author | Liu, Bo | - |
dc.contributor.author | Wu, Chunqing | - |
dc.contributor.author | Yu, Wanrong | - |
dc.contributor.author | Su, Jinshu | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Palmieri, Francesco | - |
dc.date.accessioned | 2021-08-11T17:24:47Z | - |
dc.date.available | 2021-08-11T17:24:47Z | - |
dc.date.issued | 2016-08 | - |
dc.identifier.issn | 0278-0046 | - |
dc.identifier.issn | 1557-9948 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8892 | - |
dc.description.abstract | The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific and industrial communities. Based on principles of quantum mechanics, it can provide unconditional security in key exchanges over end-to-end communication channels. Information-theoretically secure (ITS) authentication, the compulsory procedure of QKD systems, avoids the man-in-the-middle attack during the security key generation. In this paper, we propose a novel family of almost strongly universal (ASU) hash functions based on number-theoretic transforms (N-ASU), and prove that N-ASU hash functions can meet the high security requirement of an ITS authentication procedure. With such N-ASU hash functions, we propose a novel efficient NTT-based authentication algorithm (N-Auth) for QKD systems. Such a solution offers nearly the same security guarantees provided by the available authentication algorithms built upon ASU hash functions, but is characterized by a much lower computational complexity. The experimental results show that the N-Auth algorithm can fully meet the real-time and high-performance demands of modern 10-GHz QKD systems, making it a viable solution for the implementation of industrial-strength unconditionally secure broadband communication solutions. | - |
dc.format.extent | 8 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.title | A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/TIE.2016.2552152 | - |
dc.identifier.scopusid | 2-s2.0-84978757560 | - |
dc.identifier.wosid | 000384641300044 | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Industrial Electronics, v.63, no.8, pp 5101 - 5108 | - |
dc.citation.title | IEEE Transactions on Industrial Electronics | - |
dc.citation.volume | 63 | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 5101 | - |
dc.citation.endPage | 5108 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | sci | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Automation & Control Systems | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Instruments & Instrumentation | - |
dc.relation.journalWebOfScienceCategory | Automation & Control Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Instruments & Instrumentation | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | number-theoretic transforms (NTT) | - |
dc.subject.keywordAuthor | quantum key distribution (QKD) | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | universal hash functions | - |
dc.subject.keywordAuthor | 10-Ghz QKD system | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.