QAKA: A novel quantum authentication and key agreement (QAKA) protocol using quantum entanglement for secure communication among IoT devices

D Chawla, PS Mehra - Transactions on Emerging …, 2024 - Wiley Online Library
The constant evolution of the Internet of Things (IoT) concept involves the idea that all
elements in the global network communication are reachable without the need for human …

Qsmah: a novel quantum-based secure cryptosystem using mutual authentication for healthcare in the internet of things

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Healthcare in IoT provides many benefits, such as real-time data transfer and decision-
making based on the information received from the patient's Body Sensor Nodes (BSNs) …

A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information

BD Rao, R Jayaraman - Quantum Information Processing, 2023 - Springer
Classical authentication schemes are in treat due to current developments in quantum
computing. A new quantum authentication protocol designed based on quantum secure …

An improved quantum identity authentication protocol for multi-party secure communication

P He, Y Huang, J Dai, S Zhang - … , ICAIS 2020, Hohhot, China, July 17–20 …, 2020 - Springer
Quantum secure identity authentication is a gripping part in the field of quantum
communication which has an obvious superiority to makes the identity authentication system …

Identity based secure authentication scheme based on quantum key distribution for cloud computing

G Sharma, S Kalra - Peer-to-Peer Networking and applications, 2018 - Springer
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of
utmost significance as the number of hackers who seek to intrigue into legitimate user's …

An efficient quantum identity authentication key agreement protocol without entanglement

H Zhu, L Wang, Y Zhang - Quantum Information Processing, 2020 - Springer
Quantum identity authentication key agreement (QIAKA) protocols are designed to allow two
nodes to establish a secure secret key when they require few resources, such as a few …

Simultaneous quantum identity authentication scheme utilizing entanglement swapping with secret key preservation

A Dutta, A Pathak - arXiv preprint arXiv:2405.14987, 2024 - arxiv.org
Unconditional security in quantum key distribution (QKD) relies on authenticating the
identities of users involved in key distribution. While classical identity authentication …

Controlled secure direct quantum communication inspired scheme for quantum identity authentication

A Dutta, A Pathak - Quantum Information Processing, 2022 - Springer
To achieve unconditional security through quantum key distribution (QKD), users involved in
key distribution first need to authenticate each other. Classical identity authentication …

Sok: An evaluation of quantum authentication through systematic literature review

R Majumdar, S Das - Proceedings of the Workshop on Usable …, 2021 - papers.ssrn.com
Quantum computers are considered a blessing to the dynamic technological world that
promises to solve complex problems much faster than their known classical counterparts …

Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling

C Wang, Q Zhang, S Liang, H Zhu - Quantum Information Processing, 2024 - Springer
Abstract Information-theoretically secure authentication is necessary to guarantee both the
authenticity and integrity of the data transferred over the channel in quantum key agreement …