{"title":"非对称密钥认证实现的永久安全QKD协议","authors":"Heyu Yin, Qiuliang Xu","doi":"10.1109/CIS.2012.108","DOIUrl":null,"url":null,"abstract":"This paper introduces the permanent security notation. And then by combining the computational security of the classical cryptography and the theoretical security of the one-time-pad quantum cryptography, this paper provides a permanent secure QKD protocol. The protocol authenticates the both parties for two times and could get a quantum state effective rate at 100% in an ideal environment. In addition, this protocol is permanent secure, sustainable, and easy to be deployed.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication\",\"authors\":\"Heyu Yin, Qiuliang Xu\",\"doi\":\"10.1109/CIS.2012.108\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces the permanent security notation. And then by combining the computational security of the classical cryptography and the theoretical security of the one-time-pad quantum cryptography, this paper provides a permanent secure QKD protocol. The protocol authenticates the both parties for two times and could get a quantum state effective rate at 100% in an ideal environment. In addition, this protocol is permanent secure, sustainable, and easy to be deployed.\",\"PeriodicalId\":294394,\"journal\":{\"name\":\"2012 Eighth International Conference on Computational Intelligence and Security\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Eighth International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2012.108\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Eighth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2012.108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication
This paper introduces the permanent security notation. And then by combining the computational security of the classical cryptography and the theoretical security of the one-time-pad quantum cryptography, this paper provides a permanent secure QKD protocol. The protocol authenticates the both parties for two times and could get a quantum state effective rate at 100% in an ideal environment. In addition, this protocol is permanent secure, sustainable, and easy to be deployed.