A key verification protocol for quantum key distribution

4Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques. In the presence of an eavesdropper, Alice's key may not be identical with Bob's key, due to the characteristics of a quantum channel. To obtain identical keys at Alice and Bob, we propose a block-based key verification protocol that relies on Newton's polynomial interpolation. As the nodes solely share random numbers and indices of the removed blocks, no information is revealed about the secret message, at a cost of higher computational complexity. The error propagation through the key verification process is prevented by the characteristics of the proposed approach.

Cite

CITATION STYLE

APA

Karabulut Kurt, G., Ozdemir, E., Ozkirisci, N. A., & Topal, O. A. (2019). A key verification protocol for quantum key distribution. IEEE Access, 7, 141386–141394. https://doi.org/10.1109/ACCESS.2019.2943478

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free