Skip to main content

Multi-Party System Authentication for Cloud Infrastructure by Implementing QKD

  • Chapter
  • First Online:
Computational Intelligence and Efficiency in Engineering Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 595))

  • 1185 Accesses

Abstract

In this paper, we will highlight the enhances technique to authenticate multi-party system in cloud infrastructure. We propose an enhanced tight finite key scheme for Quantum Key Distribution (QKD). With this technique we believe it can provide a secure channel between a cloud client to establish a connection between them by applying quantum theories. As a final result it shows, that it can reduce the possibility of losing a private key by producing a high efficient key rate and attack resilient. Key length is an important security measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chouhan, D.S., Kharche, H.: Building trust in cloud using public key infrastructure. Int. J. Adv. Comput. Sci. Appl. 3, 26–31 (2012)

    Google Scholar 

  2. Goorden, S.A., Horstmann, M., Mosk, A.P., Škorić, B., Pinkse, P.W.H.: Quantum-secure authentication with a classical key, p. 287 (2013). arXiv preprint arXiv:1303.0142

  3. Padmavathi, V., Madhavi, M., Nagalakshmi, N.: An approach to secure authentication protocol with group signature based quantum cryptography. Int. J. Innov. Technol. Explor. Eng. 2, 105–107 (2013)

    Google Scholar 

  4. Khalid, R., Zulkarnain, Z.A.: Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. Appl. Mech. Mater. 481, 220–224 (2013)

    Article  Google Scholar 

  5. Yuan, H., Zhou, J., Zhang, G., Yang, H., Xing, L.: Efficient multiparty quantum secret sharing of secure direct communication based on bell states and continuous variable operations. Int. J. Theor. Phys. 51(11), 3443–3451 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  6. Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)

    Article  Google Scholar 

  7. Buhari, A., Ahmad, Z.Z., Subramaniam, S.K., Zainuddi, H., Saharudin, S.: A quantum based challenge response user authentication scheme over noiseless channel. Int. J. Netw. Secur. Appl. 4(6), 67–79 (2012)

    Google Scholar 

  8. Abidin, A., Larsson, J.-Å.: Direct proof of security of Wegman-Carter authentication with partially known key. Quantum Inf. Process. 13(10), 2155–2170 (2013)

    Article  MathSciNet  Google Scholar 

  9. van Assche, G.: Quantum Cryptography and Secret Key Distillation. Cambridge University Press (2012). 978-0-521-86485-5

    Google Scholar 

  10. Bennett, C.H., Brassard, G., et al.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175(150), p. 8 (1984)

    Google Scholar 

  11. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85 441–444 (2000)

    Google Scholar 

  12. Roszelinda, K., Ahmad, Z.Z.: Multi-party system authentication for cloud infrastructure by implementing QKD. In: 2nd Asia-Pacific Conference on Computer Aided System Engineering-APCASE, pp. 52–53 (2014)

    Google Scholar 

Download references

Acknowledgments

We acknowledge the generous help from Faculty of Computer Science And Information Technology, University Putra Malaysia. This work is supported by Malaysia Ministry Education under Fundamental Research Grant Scheme (FRGS).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roszelinda Khalid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Khalid, R., Zukarnain, Z.A., Hanapi, Z.M., Mohamed, M.A. (2015). Multi-Party System Authentication for Cloud Infrastructure by Implementing QKD. In: Borowik, G., Chaczko, Z., Jacak, W., Łuba, T. (eds) Computational Intelligence and Efficiency in Engineering Systems. Studies in Computational Intelligence, vol 595. Springer, Cham. https://doi.org/10.1007/978-3-319-15720-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15720-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15719-1

  • Online ISBN: 978-3-319-15720-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics