Abstract
In this paper, we will highlight the enhances technique to authenticate multi-party system in cloud infrastructure. We propose an enhanced tight finite key scheme for Quantum Key Distribution (QKD). With this technique we believe it can provide a secure channel between a cloud client to establish a connection between them by applying quantum theories. As a final result it shows, that it can reduce the possibility of losing a private key by producing a high efficient key rate and attack resilient. Key length is an important security measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chouhan, D.S., Kharche, H.: Building trust in cloud using public key infrastructure. Int. J. Adv. Comput. Sci. Appl. 3, 26–31 (2012)
Goorden, S.A., Horstmann, M., Mosk, A.P., Škorić, B., Pinkse, P.W.H.: Quantum-secure authentication with a classical key, p. 287 (2013). arXiv preprint arXiv:1303.0142
Padmavathi, V., Madhavi, M., Nagalakshmi, N.: An approach to secure authentication protocol with group signature based quantum cryptography. Int. J. Innov. Technol. Explor. Eng. 2, 105–107 (2013)
Khalid, R., Zulkarnain, Z.A.: Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. Appl. Mech. Mater. 481, 220–224 (2013)
Yuan, H., Zhou, J., Zhang, G., Yang, H., Xing, L.: Efficient multiparty quantum secret sharing of secure direct communication based on bell states and continuous variable operations. Int. J. Theor. Phys. 51(11), 3443–3451 (2012)
Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)
Buhari, A., Ahmad, Z.Z., Subramaniam, S.K., Zainuddi, H., Saharudin, S.: A quantum based challenge response user authentication scheme over noiseless channel. Int. J. Netw. Secur. Appl. 4(6), 67–79 (2012)
Abidin, A., Larsson, J.-Å.: Direct proof of security of Wegman-Carter authentication with partially known key. Quantum Inf. Process. 13(10), 2155–2170 (2013)
van Assche, G.: Quantum Cryptography and Secret Key Distillation. Cambridge University Press (2012). 978-0-521-86485-5
Bennett, C.H., Brassard, G., et al.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175(150), p. 8 (1984)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85 441–444 (2000)
Roszelinda, K., Ahmad, Z.Z.: Multi-party system authentication for cloud infrastructure by implementing QKD. In: 2nd Asia-Pacific Conference on Computer Aided System Engineering-APCASE, pp. 52–53 (2014)
Acknowledgments
We acknowledge the generous help from Faculty of Computer Science And Information Technology, University Putra Malaysia. This work is supported by Malaysia Ministry Education under Fundamental Research Grant Scheme (FRGS).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Khalid, R., Zukarnain, Z.A., Hanapi, Z.M., Mohamed, M.A. (2015). Multi-Party System Authentication for Cloud Infrastructure by Implementing QKD. In: Borowik, G., Chaczko, Z., Jacak, W., Łuba, T. (eds) Computational Intelligence and Efficiency in Engineering Systems. Studies in Computational Intelligence, vol 595. Springer, Cham. https://doi.org/10.1007/978-3-319-15720-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-15720-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15719-1
Online ISBN: 978-3-319-15720-7
eBook Packages: EngineeringEngineering (R0)