Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality

Vol. 18, No. 4, pp. 69-78, Aug. 2008
10.13089/JKIISC.2008.18.4.69, Full Text:
Keywords: Quantum Key Distribution, Quantum authentication, CHSH inequality
Abstract

We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Heo, C. Hong, J. Lim, H. Yang, "Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 4, pp. 69-78, 2008. DOI: 10.13089/JKIISC.2008.18.4.69.

[ACM Style]
Jin-O Heo, Chang-Ho Hong, Jong-In Lim, and Hyoung-Jin Yang. 2008. Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality. Journal of The Korea Institute of Information Security and Cryptology, 18, 4, (2008), 69-78. DOI: 10.13089/JKIISC.2008.18.4.69.