Abstract
The following chapter deals with a possible application of methods of quantum cryptography to permit secure communication between parties in different architectures by establishing a Ring of Trust. The aim is to solve the problems of key distribution with methods of quantum cryptography without being limited by their transmission range. At the same time, a high level of security is obtained, which is ensured by the use of corresponding cryptographic algorithms. The model is not restricted to certain cryptographic algorithms. Therefore, it is possible to enlarge a preexisting system with new cryptographic algorithms or to replace formerly employed cryptographic algorithms with new ones.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
- Quantum Channel
- Secure Communication
- Advance Encryption Standard
- Accounting Information
- Communication Step
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
F.I.P.S.P. Security Requirements for Cryptographic Modules. NIST, 140-2
F.I.P.S.P, 197: Announcing the Advanced Encryption Standard (AES). NIST
Bennet, C.H., Besset, F., Brassard, G., Salvail, L., Smolin, J.: Experimental Quantum Cryptography. J. Cryptology 5, 3(1992)
Dissauer, G.: Security requirements of modern medical information systems. Master’s thesis, Vienna University of Technology, Austria (2007)
Dolin, R.H., Aschuler, L., Boyer, S., Beebe, C., Behlen, F.M., Biron, P.V., Shabo, A.: Medical Informatics Europe. J. Am. Med. Inform Assoc. (2006)
Haas, P.: Medizinische Informationssysteme und elektronische Krankenakten. Springer Verlag, Berlin, Germany (2004)
Iakovidis, I.: Towards a Health Telematics Infrastructure in the European Union. European Commission, Brussels, Belgium (2000)
Lehmann, T.M.: Handbuch der Medizinischen Informatik. Carl Hanser Verlag, Munchen, Germany (2005)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press Boca Raton (1996)
Smith, B., Ceustersc, W.: Medical Informatics Europe. Maastricht, Netherlands (2006)
van Bemmel, J., Musen, M.A.: Handbook pf Medical Informatics. Springer Verlag, Heidelberg, Germany (1997)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kollmitzer, C., Moesslacher, C. (2010). The Ring of Trust Model. In: Kollmitzer, C., Pivk, M. (eds) Applied Quantum Cryptography. Lecture Notes in Physics, vol 797. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04831-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-04831-9_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04829-6
Online ISBN: 978-3-642-04831-9
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)