Nokia Technologies Oy (20240250810). IDENTITY AUTHENTICATION FOR QKD PROTOCOLS simplified abstract

From WikiPatents
Jump to navigation Jump to search

IDENTITY AUTHENTICATION FOR QKD PROTOCOLS

Organization Name

Nokia Technologies Oy

Inventor(s)

Ludovic Noirie of Massy (FR)

Rémi Varloot of Massy (FR)

IDENTITY AUTHENTICATION FOR QKD PROTOCOLS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240250810 titled 'IDENTITY AUTHENTICATION FOR QKD PROTOCOLS

Simplified Explanation

In this patent application, Alice authenticates Bob by sending randomly selected indexes to Bob through a classical channel. Bob then extracts subsequences of qubit-related data based on these indexes and sends them back to Alice. At least one of the subsequences may be encrypted with a shared secret key. Alice can then authenticate Bob based on the number of errors in the decrypted subsequences.

Key Features and Innovation

  • Authentication process between Alice and Bob using randomly selected indexes.
  • Extraction of qubit-related data by Bob based on the received indexes.
  • Encryption of at least one subsequence with a shared secret key.
  • Authentication of Bob by Alice based on error computation in decrypted subsequences.

Potential Applications

This technology can be used in secure communication systems, quantum cryptography, and data encryption protocols.

Problems Solved

This technology addresses the need for secure authentication in quantum communication systems and ensures data integrity between parties.

Benefits

  • Enhanced security in communication systems.
  • Efficient authentication process.
  • Protection against unauthorized access to data.

Commercial Applications

Title: Quantum Authentication Technology for Secure Communication Systems This technology can be applied in industries such as finance, healthcare, and government agencies to secure sensitive information and communications.

Prior Art

Further research can be conducted in the field of quantum cryptography and secure communication protocols to explore similar authentication methods.

Frequently Updated Research

Researchers are continually exploring advancements in quantum cryptography and secure communication technologies, which may lead to further innovations in authentication processes.

Questions about Quantum Authentication Technology

How does this technology improve data security in communication systems?

This technology enhances data security by providing a secure authentication process between parties, ensuring data integrity and protection against unauthorized access.

What are the potential challenges in implementing this quantum authentication technology on a larger scale?

The challenges in implementing this technology on a larger scale may include scalability issues, compatibility with existing systems, and the need for robust encryption protocols.


Original Abstract Submitted

for bob's authentication to alice, alice sends to bob randomly selected indexes via the classical channel between alice and bob. in response, bob extracts, from the sequences of qubit-related data generated by bob and based on the randomly selected indexes received from alice, subsequences of qubit-related data (e.g. including binary axis identifiers and bit values) and bob sends the extracted subsequences via the classical channel. at least one of sent subsequences may be encrypted with a shared secret cryptographic key. then alice can authenticate bob on the basis of a number of errors computed based on the decrypted subsequences received from bob.