Advertisement

The European Physical Journal Special Topics

, Volume 223, Issue 8, pp 1711–1728 | Cite as

Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption

  • A.F. MetwalyEmail author
  • M.Z. Rashad
  • F.A. Omara
  • A.A. Megahed
Regular Article Other Applications for Communication
Part of the following topical collections:
  1. Chaos, Cryptography and Communications

Abstract

Multicasting refers to the transmission of a message or information from one sender to multiple receivers simultaneously. Although encryption algorithms can be used to secure transmitted messages among group members, still there are many security aspects for designing a secured multicast cryptosystem. The most important aspects of Multicasting are key generation and management. The researchers have proposed several approaches for solving problems of multicast key distribution and management. In this paper, a secure key generation and distribution solution has been proposed for a single host sending to two or more (N) receivers using centralized Quantum Multicast Key Distribution Centre “QMKDC” and classical symmetric encryption. The proposed scheme uses symmetric classical algorithms for encryption and decryption transmitted messages among multicast group members, but the generated keys which are used for authentication, encryption and decryption also play an important role for designing a secured multicast cryptosystem come from QKD protocols. Authentication verified using EPR entangled Photons and controlled-NOT gate. Multiple requests for initialization as well for transmitting sensitive information handled through priority and sensitivity levels. Multiple members’ communication is achieved with full or partial support of QMKDC.

Keywords

European Physical Journal Special Topic Multicast Group Data Encryption Standard Optical Router Multicast Group Member 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Deering, Ph.D. thesis, Stanford University, 1991Google Scholar
  2. 2.
    S. Rafaeli, D. Hutchison, ACM Comput. Surv. 35, 309 (2003)CrossRefGoogle Scholar
  3. 3.
    D. Wallner, E. Harder, R. Agee, Internet Draft, RFC 2627, June (1999)Google Scholar
  4. 4.
    C.K. Wong, M. Gouda, S.S. Lam, IEEE/ACM Trans. Network. 8, 16 (2000)CrossRefGoogle Scholar
  5. 5.
    C.H. Bennett, G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India, 1984), p. 175Google Scholar
  6. 6.
    W.K. Wooters, W.H. Zurek, Nature 299, 802 (1982)CrossRefADSGoogle Scholar
  7. 7.
    C.H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)CrossRefzbMATHMathSciNetADSGoogle Scholar
  8. 8.
    A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991)CrossRefzbMATHMathSciNetADSGoogle Scholar
  9. 9.
    C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, J. Cryptology 5, 3 (1992)CrossRefzbMATHGoogle Scholar
  10. 10.
    L. Goldenberg, L. Vaidman, Phys. Rev. Lett. 75, 1239 (1995)CrossRefzbMATHMathSciNetADSGoogle Scholar
  11. 11.
    M. Koashi, N. Imoto, Phys. Rev. Lett. 79, 2383 (1997)CrossRefzbMATHMathSciNetADSGoogle Scholar
  12. 12.
    H. Bechmann-Pasquinucc, Asher Peres, Phys. Rev. Lett. 85, 3313 (2000)CrossRefADSGoogle Scholar
  13. 13.
    D. Bruss, Phys. Rev. Lett. 81, 3018 (1998)CrossRefADSGoogle Scholar
  14. 14.
    G.H. Zeng, Z.Y. Wang, H.W. Zhu, The 5th International Conference on Quantum Communication, Measurement and Computing (Kluver Academic/Plenum Publishers, Capri, 2000), p. 2Google Scholar
  15. 15.
    A. Barenco, C.H. Bennett, R. Cleve, D.P. Di Vincenzo, N. Margolus, P. Shor, Phys. Rev. A 52, 3457 (1995)CrossRefADSGoogle Scholar
  16. 16.
    H.M.N. Dilum Bandara, A.P. Jayasumana, Peer-to-Peer Networking and Applications, Vol. 6 (Springer, 2013), p. 257Google Scholar
  17. 17.
    C.-J. Guo, Y.-M. Huang, Int. J. Innovative Comput. Inf. Cont. 8, 5523 (2012)Google Scholar
  18. 18.
    H. Siramdasu, H. Krishna, Int. J. Eng. Trends Technol. (IJETT) 4, 1367 (2013)Google Scholar
  19. 19.
    D.S. Devi, G. Padmavathi, Int. J. Comput. Sci. Inf. Security 7, 218 (2010)Google Scholar
  20. 20.
    S. Cobourne, Quantum Key Distribution Protocols and Applications. Technical Report, Department of Mathematics (England: University of London, 2011)Google Scholar
  21. 21.
    Y. Kumar, R. Munjal, H. Sharma, Int. J. Comput. Sci. Manag. Studies 11, 60 (2011)Google Scholar
  22. 22.
    H. Ansari, A. Parameswaran, L. Antani, B. Aditya, A. Taly, L. Kumar, Network Security Course Project Report, Department of Computer Science and Engineering (Mumbai: Indian Institute of Technology, Bombay, 2006)Google Scholar
  23. 23.
    G. Zeng, Quantum Private Communication (Springer Berlin-Heidelberg, 2010)Google Scholar
  24. 24.
    A.F. Metwaly, M.Z. Rashad, F.A. Omara, A.A. Megahed, 8th IEEE International Conference on Informatics and Systems (Cairo, 2012), p. 25Google Scholar
  25. 25.
    S. Deering, Internet Draft, RFC 1112, August (1989)Google Scholar
  26. 26.
    S. Berkovits, Advances in Cryptology, EUROCRYPT, Lecture Notes in Computer Science, Vol. 547 (Springer-Verlag, Brighton, UK 1991), p. 535Google Scholar
  27. 27.
    G.H. Chiou, W.T. Chen, IEEE Trans. Software Eng. 15, 929 (1989)CrossRefGoogle Scholar
  28. 28.
    A. Fiat, M. Naor, Advances in Cryptology, Lecture Notes in Computer Science, Vol. 773 (Springer-Verlag, California, USA, 1993), p. 480Google Scholar
  29. 29.
    D.R. Stinson, Designs, Codes & Cryptography, Vol. 12 (Springer, 1997), p 215Google Scholar
  30. 30.
    M. Hirvensalo, Natural Computing Series (Springer, 2004)Google Scholar
  31. 31.
    S. Devaraju, P. Ganapathi, Int. J. Comput. Sci. Issues 7, 30 (2010)Google Scholar
  32. 32.
    T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, A. Zeilinger, Phys. Rev. Lett. 84, 4729 (2000)CrossRefADSGoogle Scholar
  33. 33.
    R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Proc. INFOCOM’99 Conf. Comput. Comm. 2, 708 (1999)Google Scholar
  34. 34.
    G. Caronni, K. Waldvogel, D. Sun, B. Plattner, Proceedings of the Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET-ICE ’98) (1998), p. 376Google Scholar
  35. 35.
    M. Koashi, Efficient quantum key distribution with practical sources and detectors [arXiv:quant-ph/0609180] (2006)
  36. 36.
    P. Rice, J.W. Harrington, Numerical analysis of decoy state quantum key distribution protocols [ArXiv:0901.0013] (2009)

Copyright information

© EDP Sciences and Springer 2014

Authors and Affiliations

  • A.F. Metwaly
    • 1
    Email author
  • M.Z. Rashad
    • 2
  • F.A. Omara
    • 3
  • A.A. Megahed
    • 4
  1. 1.Information Technology Department, Al-Zahra College for WomenAl-ZahraOman
  2. 2.Faculty of Computer and Information Sciences, Mansoura UniversityMansouraEgypt
  3. 3.Faculty of Computer and Information Sciences, Cairo UniversityCairoEgypt
  4. 4.Faculty of Engineering, Cairo UniversityCairoEgypt

Personalised recommendations