An Optimized, Authenticated Key Distribution Protocol for Optical Channels

  • Sara AboziedEmail author
  • Hassan Elkamchouchi
  • Yasmine Abouelseoud
  • Refaat El-Attar
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 247)


In this paper, a key distribution protocol based on the integration of both classical and quantum cryptography is developed. Quantum physics laws ensure detection of eavesdropping over optical channels, while classical cryptography provides convenient techniques that enable efficient user authentication and prevent denial of previous commitments. The proposed scheme is based on the RSA-TBOS signcryption scheme to achieve the combined functionality of a digital signature and encryption in an efficient manner. It therefore offers four security services: privacy, authenticity, data integrity and non-repudiation. The ciphertext is converted to binary bits and then to qubits. The protocol involves a small number of rounds and the number of keys stored at the user side is kept minimal promoting its use in large networks. A comparative study with other schemes in literature revealed that it represents a remarkably good trade-off between the storage as well as bandwidth requirements and the security services offered.


Authentication Classical cryptography Digital signature Quantum cryptography (QC) RSA-TBOS signcryption Session key 


  1. 1.
    Elboukhari M, Azizi M, Azizi A (2010) Quantum key distribution protocols. Int J Univ Comput Sci I(201):59–67Google Scholar
  2. 2.
    Amutha B, Nivedha V (2009) AMNI’09 protocols. Int J Univ Comput Sci 2:297–303Google Scholar
  3. 3.
    Stallings W (2005) Cryptography and network security: principles and practice, 4th edn. Prentice Hall, New YorkGoogle Scholar
  4. 4.
    Bennett CH, Brassard G (2004) Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing, Bangalore, IndiaGoogle Scholar
  5. 5.
    Kanamori Y, Moo Yoo S, Gregory D, Sheldon T (2005) On quantum authentication protocols. In: Proceedings of the IEEE Global Tele-communications Conference, GLOBECOM’05, vol 3Google Scholar
  6. 6.
    Li X, Chen L (2007) Quantum authentication protocol using bell states, First International Symposium on Data, Privacy and E-Commerce, IEEE Computer Society, 2007, pp 128–132Google Scholar
  7. 7.
    Reddy KS, Medapati RK (2011) “Three party Quantum Authenticated Key Distribution Protocol Using Superposition States. Int J Comp Appl 2, Rado GT, Suhl H eds Academic Press, New York, pp 1589–1594Google Scholar
  8. 8.
    Malone-Lee J, Mao W (2003) Two birds one stone: signcryption using RSA. In: Topics in cryptology-CT-RSA 2003, Lecture notes in computer science, vol 2612. Springer, Berlin, pp 211–225Google Scholar
  9. 9.
    Abozeid S et al (2012) An authenticated key distribution scheme. In: Proceedings of the World Congress on Engineering and Computer Science, 2012, vol. II, WCECS 2012, 24–26, Oct 2012, San Francisco, USA, pp 983–987Google Scholar
  10. 10.
    Cao Z, Liu L (2010) Improvement of one quantum encryption scheme. IEEE International Conference on Intelligent and Computing Systems (ICIS), vol 1, pp 335–339Google Scholar
  11. 11.
    Bouwmeester D, Ekert A, Zeilinger A (2000) The physics of quantum information. Springer, New YorkCrossRefzbMATHGoogle Scholar
  12. 12.
    Bennett C, Bessette F, Brassard G, Salvail L, Amolin J (1992) Experimental quantum cryptography. J of Cryptol 5:3–28zbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Sara Abozied
    • 1
    Email author
  • Hassan Elkamchouchi
    • 2
  • Yasmine Abouelseoud
    • 3
  • Refaat El-Attar
    • 4
  1. 1.Engineering Mathematics DepartmentAlexandria UniversityAlexandriaEgypt
  2. 2.Electrical Engineering DepartmentAlexandria UniversityAlexandriaEgypt
  3. 3.Engineering Mathematics DepartmentAlexandria UniversityAlexandriaEgypt
  4. 4.Engineering Mathematics DepartmentAlexandria UniversityAlexandriaEgypt

Personalised recommendations