Abstract

Access control is a mechanism that is used to decide which agent has access to which resource with some specific operations. This paper is devoted to the investigation of quantum cryptography in access control. We develop three quantum protocols and use them for key distribution, identity authentication and digital certification, respectively. We analyze our protocols by the graphical language of categorical quantum mechanics. These protocols are unconditionally secure and implementable by the current technology.

Highlights

  • We study the application of quantum cryptography in access control in cloud computing

  • We further develop the model of access control in cloud computing proposed by Hota et al (2011), by using quantum cryptography to grant access to agents

  • We present our quantum protocols in the framework of categorical quantum mechanics (Abramsky and Coecke 2004; Coecke and Duncan 2008; Selinger 2011; Coecke et al 2011; Backens et al 2016), which is the study of quantum foundations and quantum information using category theory

Read more

Summary

Introduction

We study the application of quantum cryptography in access control in cloud computing. Models of access control in cloud computing are developed in Wang et al (2009) and Hota et al (2011). We further develop the model of access control in cloud computing proposed by Hota et al (2011), by using quantum cryptography to grant access to agents. The structure of the rest of this paper is as follows: After a brief review of the background knowledge on quantum computation and categorical quantum mechanics, we present three quantum protocols for key distribution, authen-.

Qubits
Quantum gates
Measurement
Graphical calculus for quantum computation
Quantum cryptography for access control
Quantum key distribution
Quantum authentication
Quantum certificate and signature
Related work
Conclusion
Compliance with ethical standards
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.