• DocumentCode
    2893127
  • Title

    Secure and efficient key management technique in quantum cryptography network

  • Author

    Pattaranantakul, Montida ; Janthong, Aroon ; Sanguannam, Kittichai ; Sangwongngam, Paramin ; Sripimanwat, Keattisak

  • Author_Institution
    Opt. & Quantum Commun. Lab., Nat. Electron. & Comput. Technol. Center, Pathumthani, Thailand
  • fYear
    2012
  • fDate
    4-6 July 2012
  • Firstpage
    280
  • Lastpage
    285
  • Abstract
    In conventional security mechanism, security services based on symmetric key cryptography assume keys to be distributed prior to secure communications. The core function of exchanging and sharing a secret key between two endpoints are the secure key management methodology which is one of the most critical elements need to be more concerned when integrating cryptographic functions into the system. In case the key management mechanisms is weak can lead to the vulnerability holes or a potentially fatal outsider attacks as the harmful effects to the system. Since, there is still no standardized architecture or protocol that can provide cross application symmetric key management services. Therefore, this paper approaches a secure key management model and its custom protocols to build Thailand quantum trusted network with offers simultaneous quantum key distribution to multiple user overtime. Consequently, the proposed technique has also overcome the limitation of quantum point-to-point key sharing. Based on the discussion of key management security requirement, deal with generic key management concepts and designing the new custom protocols to close the possibility loopholes, to offers reliability and convenience of use, as well as to introduce a secure and efficient key management technique for quantum cryptography network in Thailand where any communication services can take place.
  • Keywords
    protocols; quantum cryptography; telecommunication security; Thailand quantum trusted network; communication services; cryptographic functions; custom protocols; efficient key management technique; harmful effects; multiple user overtime; potentially fatal outsider attacks; protocol; quantum cryptography network; quantum key distribution; secure communications; secure key management methodology; secure key management technique; security mechanism; security services; symmetric key cryptography; Encryption; Peer to peer computing; Protocols; Servers; Virtual private networks; Custom protocols; Key Management; Quantum Keys;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on
  • Conference_Location
    Phuket
  • ISSN
    2165-8528
  • Print_ISBN
    978-1-4673-1377-3
  • Electronic_ISBN
    2165-8528
  • Type

    conf

  • DOI
    10.1109/ICUFN.2012.6261711
  • Filename
    6261711