Elliptic Curve Cryptography (ECC) Based Four State Quantum Secret Sharing (QSS) Protocol


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


In the previous four party QSS protocol sharing quantum state information between the parties in the quantum system. But, the method lacks in security process when the information are shared between parties. So, to avoid this drawback, a new four party security based QSS method is proposed in this paper. Here, an ECC based security method is developed in the QSS protocol to share the secured information between the parties. The proposed method is comprised of three major processes, namely, ECC based Key generation, encryption & decryption, Information sharing and security evaluation. The proposed method performance is analyzed by invoking more number of information is shared between parties and the result from this process guarantees the healthiness of the proposed algorithm. The implementation results show the effectiveness of proposed ECC based four party QSS protocol in sharing the information between parties in the quantum state and the achieved improvement in security process. Furthermore, the performance of the proposed technique is evaluated by comparing with the previous four party QSS protocol.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Quantum Secret Sharing (QSS); Elliptic Curve Cryptography (ECC); Genetic Algorithm (GA); Tabu Search Algorithm (TS); Cuckoo Search Algorithm (CS)

Full Text:

PDF


References


Rahul Aggarwal, Heeren Sharma and Deepak Gupta, “Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol”, International Journal of Computer Applications (0975 – 8887), Vol. 20, No. 8, pp. 28-31, 2011

NurAtiqah Muhammad and Zuriati Ahmad Zukarnain, “Implementation of BB84 Quantum Key Distribution Protocol’s with Attacks”, European Journal of Scientific Research, Vol. 32 No. 4, pp. 460-466, 2009.

Muhammad Mubashir Khan and JieXu, “Quantum Cryptography with Generalized Bases and Dimensions of Photon States”, International Journal of Security and Its Applications, Vol. 6, No. 1, pp. 49- 56, 2012.

Fei Gao, Su-Juan Qin, Fen-ZhuoGuo, and Qiao-Yan Wen, “Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols”, IEEE journal of quantum electronics, Vol. X, No. X, pp. 1-6, 2010.

Mohamed Elboukhari, AbdelmalekAzizi, and Mustafa Azizi, “Integration of Quantum Cryptography in the TLS Protocol: Reality and Perspectives”, MICS’10 International conference, Ensias, Rabat Morocco ,Nov 2-4,2010

Rishi Dutt Sharma, “Quantum Cryptography: A new approach to information security”, International Journal of Power System Operation and Energy Management (IJPSOEM), Vol.1, No. 1,pp.11-13, 2011

G.AnandaRao, Y.Srinivas, J.VijayaSekhar and Ch.Pavan Kumar, “Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography”, Indian Journal of Computer Science and Engineering, Vol. 2, No. 2 ,pp. 143-145, 2011.

T. Rubya N. PremaLatha and B. Sangeetha, “A Survey on Recent Security Trends using Quantum Cryptography”, (IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No. 09, pp. 3038-3042, 2010.

Thi Mai Trang Nguyen, Mohamed Ali Sfaxi and SolangeGhernaouti-Helie, “802.11i Encryption Key Distribution Using Quantum Cryptography”, Journal of networks, Vol. 1, No. 5, pp.9-20,2006

Zhang XingLan, “One-way quantum identity authentication based on public key”, Chinese Science Bulletin, Vol.54, No.12, pp.2018-2021, 2009.

Veronica Fernandez, Robert J. Collins, Karen J. Gordon, Paul D. Townsend, and Gerald S. Buller , “Passive Optical Network Approach to Giga Hertz-Clocked Multiuser Quantum Key Distribution”, IEEE journal of quantum electronics, Vol. 43, No 2, pp.1-9,2007

Kyo Inoue, “Quantum Key Distribution Technologies”, IEEE journal of selected topics in quantum electronics, Vol. 12, No. 4, pp.888-896, 2006.

Xiao-Ming Xiu ,Li Dong, Ya-Jun Gao, Feng Chi, Yuan-PengRen and Hui-Wei Liu, “A revised controlled deterministic secure quantum communication with five-photon entangled state”, Journal Optics Communications, Vol.283,No. 2, pp. 344–347, 2010.

I-Ching Yu, Feng-Li Liny and Ching-Yu Huangz, “Quantum secret sharing with multilevel mutually (un)biased base”, Phys. Rev letters, Vol.78, No.1, pp.1-5, 2008

Zhang Zhan Jun and Man zhongxiao, “Multiparty quantum secret sharing of key using practical faint laser pulses”,Chin.Phsy.Letters, Vol.22, No.7, pp.1588-1591, 2005

Majid Safari, and Murat Uysal, “Relay-Assisted Quantum-Key Distribution Over Long Atmospheric Channels”, Journal of light wave technology, Vol. 27, No. 20, pp.4508-4515,2009

Pradeep Kumar and Anil Prabhakar, “Quantum Key Distribution using Spin Wave–Optical Interactions”, IEEE journal of quantum electronics, Vol. 46, No. 11, pp.1542-1548,2010

Gan Gao, “Cryptanalysis of multiparty quantum secret sharing with collective eavesdropping-check”, Journal Optics Communications, Vol. 283, No.14, pp. 2997–3000, 2010

K. Sathi Reddy and Raja Kumar Medapati, “Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States”, Int. J. Comp. Tech. Appl., Vol 2,No.5, pp.1589-1594,2011

R. Ku. Jena and P. K. Mahanti, A State-of-the-art Review on Quantum Information Computing, (2007) International Review on Computers and Software (IRECOS), 2 (5), pp. 451-462.

Kehil, D., Ferdi, Y., Kissar, S., Speech encryption using FFT transform with enhanced security, (2009) International Review on Computers and Software (IRECOS), 4 (4), pp. 447-451.

Khatib, M., Al-Haija, Q.A., Jaafar, A., Hardware architectures & designs for projective Elliptic curves point addition operation using variable levels of parallelism, (2011) International Review on Computers and Software (IRECOS), 6 (2), pp. 227-236.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2022 Praise Worthy Prize