Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Cryptographic defense against traffic analysis
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
On using quantum protocols to detect traffic analysis
Quantum Information & Computation
Hi-index | 0.00 |
Recently, a basic design for a quantum protocol to detect a perpetual traffic analysis of a communication channel has been proposed1. As it stands, this protocol does not take the problem of authentication into account. We show that a 'standard' authentication procedure does not apply in this context, as the attacker is only interested in the number of transmitted bits. Moreover, we demonstrate how to use a one-time pad like construction for solving this authentication problem.