Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 79 - Number 3
Year of Publication: 2013
Darnasi Veeraiah
R. Upendar Rao
K V Ranga Rao

Darnasi Veeraiah, Upendar R Rao and Ranga K V Rao. Article: Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography. International Journal of Computer Applications 79(3):43-47, October 2013. Full text available. BibTeX

	author = {Darnasi Veeraiah and R. Upendar Rao and K V Ranga Rao},
	title = {Article: Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {79},
	number = {3},
	pages = {43-47},
	month = {October},
	note = {Full text available}


In now a days, most of the communication takes place through Internet. Most of the users are used to transmit their information through insecure channels that are interconnected throughout world. Thus, security must be provided to achieve confidentiality, access control, integrity and authentication. To ensure all these services, various cryptography and steganography techniques like RSA, AES, MD5 and RC5 have been used. Even though, cryptanalysts reinforcing it using some mathematical computation and misused information. Currently, quantum computers have been used to increase the speed of computation and to provide more security for data. It exploits quantum mechanics to provide secure communication. Quantum cryptography (QC) technique has been used to share the key among the participants who wish to share the data. This paper discusses various cryptographic key distribution protocols and quantum mechanics. In this paper we proposed "Secure Node Signature Verification Algorithm"(SNSVA) based on Quantum cryptography technique that describes how authentication can be verified with network nodes. In addition, it explains an approach to improve the performance of cryptography technique.


  • Bennett and Brassard, G. ,"Quantum cryptography: public key distribution and coin tossing", IEEE Conference on Computer, Systems, and Signal Processing, 1984, pp. 175-90.
  • Bennett, C. H. , "Quantum cryptography using any two non-orthogonal states". Physics Review Letter1992.
  • Bennett, C. H. , Bessette, F. , Brassard, G. , Salvail, L. , & Smolin, J. ,"Experimental quantum cryptography", Journal of Cryptology, 1992.
  • Elliot, C. , "Quantum Cryptography", IEEE Security & Privacy Journal, 2004.
  • B. Hutter, N. Imoto, N. Gisin, T. Mor, Quantum cryptography with coherent states, Physical Review pp. 1863–1869, 1995.
  • Inoue K, Woks E and Yamamoto Y 2002, "Differential phase shift quantum key distribution", Phys. Rev. Lett. 89 037902.
  • Chi-Hang Fred Fung, Kiyoshi Tamaki, Hoi-Kwong Lo, "On the performance of two protocols: SARG04 and BB84", Phys. Rev. A 73, 012337 (2006).
  • Eduin H. Serna,"Quantum Key Distribution Protocol withPrivate-Public Key", Quantum Physics, 2009.
  • Higgins, Diffie, Strawczynski and Hoog, "Encryption and ISDN - A Natural Fit", International Switching Symposium (ISS87), 1987.
  • Bellovin and Merritt, "Encrypted Key Exchange: Password Based Protocols Secure against Dictionary Attacks and Password file Compromise", Proceedings of 1st ACM Conference on Computer and Communication Security, ACM Press, pp. 244-250, 1993.
  • Wegman and Carter,"New Hash Functions and Their Use in Authentication and Set Equality', J. Comput. Syst. Sci. , Vol. 22, pp. 265-279, 1981.
  • http://www. quantiki. org
  • http://cam. qubit. org
  • http://www. afn. org