DocumentCode
2893127
Title
Secure and efficient key management technique in quantum cryptography network
Author
Pattaranantakul, Montida ; Janthong, Aroon ; Sanguannam, Kittichai ; Sangwongngam, Paramin ; Sripimanwat, Keattisak
Author_Institution
Opt. & Quantum Commun. Lab., Nat. Electron. & Comput. Technol. Center, Pathumthani, Thailand
fYear
2012
fDate
4-6 July 2012
Firstpage
280
Lastpage
285
Abstract
In conventional security mechanism, security services based on symmetric key cryptography assume keys to be distributed prior to secure communications. The core function of exchanging and sharing a secret key between two endpoints are the secure key management methodology which is one of the most critical elements need to be more concerned when integrating cryptographic functions into the system. In case the key management mechanisms is weak can lead to the vulnerability holes or a potentially fatal outsider attacks as the harmful effects to the system. Since, there is still no standardized architecture or protocol that can provide cross application symmetric key management services. Therefore, this paper approaches a secure key management model and its custom protocols to build Thailand quantum trusted network with offers simultaneous quantum key distribution to multiple user overtime. Consequently, the proposed technique has also overcome the limitation of quantum point-to-point key sharing. Based on the discussion of key management security requirement, deal with generic key management concepts and designing the new custom protocols to close the possibility loopholes, to offers reliability and convenience of use, as well as to introduce a secure and efficient key management technique for quantum cryptography network in Thailand where any communication services can take place.
Keywords
protocols; quantum cryptography; telecommunication security; Thailand quantum trusted network; communication services; cryptographic functions; custom protocols; efficient key management technique; harmful effects; multiple user overtime; potentially fatal outsider attacks; protocol; quantum cryptography network; quantum key distribution; secure communications; secure key management methodology; secure key management technique; security mechanism; security services; symmetric key cryptography; Encryption; Peer to peer computing; Protocols; Servers; Virtual private networks; Custom protocols; Key Management; Quantum Keys;
fLanguage
English
Publisher
ieee
Conference_Titel
Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on
Conference_Location
Phuket
ISSN
2165-8528
Print_ISBN
978-1-4673-1377-3
Electronic_ISBN
2165-8528
Type
conf
DOI
10.1109/ICUFN.2012.6261711
Filename
6261711
Link To Document