Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoshito Kanamori is active.

Publication


Featured researches published by Yoshito Kanamori.


global communications conference | 2005

On quantum authentication protocols

Yoshito Kanamori; Seong-Moo Yoo; Don A. Gregory; Frederick T. Sheldon

When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have computational power enough to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. We propose an authentication protocol using quantum superposition states instead of quantum entangled particles. Our protocol can be implemented with the current technologies we introduce in this paper.


global communications conference | 2008

Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party

Yoshito Kanamori; Bogdan Hoanca; Seong-Moo Yoo

In this paper, a novel three-party quantum authenticated key distribution with a partially trusted third party protocol is proposed. Unlike most classical cryptography, the security of the protocol does not rely on the amount of computations required to find the encryption key, but on physical properties of the transmission medium (i.e., quantum mechanical properties). The session key shared between participants is concealed from the trusted third party while the participants trust the third party regarding the authentication part. Thus, the proposed system will be preferable for network systems in/between institutions, which deal with highly sensitive information (e.g., military bases, research facilities, hospitals).


acm southeast regional conference | 2005

A quantum no-key protocol for secure data communication

Yoshito Kanamori; Seong-Moo Yoo; Mohammad Al-Shurman

Since classical cryptography relies on difficulty and infeasibility of computation to find the plain text, the cryptography is losing security more and more as computational power is increased by technical innovations. Therefore, unconditionally secure cryptography has been expected. In this paper, we propose a novel, secure, no-key, protocol: Quantum Three-Pass Protocol (QTPP). In this protocol, quantum superposition states are used for transmission instead of classical signals in classical cryptography.


acm southeast regional conference | 2005

Decreasing broadcast in route discovery using vectors in mobile ad hoc networks

Mohammad Al-Shurman; Seong-Moo Yoo; Yoshito Kanamori

Wireless ad hoc networks routing protocols rely on traditional broadcast (flooding) in route establishment. Many nodes will rebroadcast the packet. Valuable network resources (e.g., battery power) can be consumed in flooding. In this paper, we will propose Vectorized Broadcast Routing (VBR) as an enhancement for LAR scheme 1 to reduce the broadcast. In case of discovery phase failure, VBR will enlarge the broadcast region again around the destination, unlike LAR where the network will be flooded with this request again. Simulation results show that VBR can decrease the number of routing packets by about one-third compared to LAR.


arXiv: Cryptography and Security | 2010

QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES

Yoshito Kanamori; Seong-Moo Yoo


International Journal of Computers and Applications | 2006

A SHORT SURVEY ON QUANTUM COMPUTERS

Yoshito Kanamori; Seong-Moo Yoo; Wendi Pan; Frederick T. Sheldon


global communications conference | 2006

Bank Transfer Over Quantum Channel With Digital Checks

Yoshito Kanamori; Seong-Moo Yoo; Frederick T. Sheldon


global communications conference | 2006

NISp1-10: Bank Transfer over Quantum Channel with Digital Checks

Yoshito Kanamori; Seong-Moo Yoo; Frederick T. Sheldon


Archive | 2013

Cloud Computing Security and Risk Management

Yoshito Kanamori; Minnie Yi-Miin Yen


Archive | 2006

Quantum encryption and authentication protocols

Seong-Moo Yoo; Yoshito Kanamori

Collaboration


Dive into the Yoshito Kanamori's collaboration.

Top Co-Authors

Avatar

Seong-Moo Yoo

University of Alabama in Huntsville

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohammad Al-Shurman

University of Alabama in Huntsville

View shared research outputs
Top Co-Authors

Avatar

Bogdan Hoanca

University of Alaska Anchorage

View shared research outputs
Top Co-Authors

Avatar

Don A. Gregory

University of Alabama in Huntsville

View shared research outputs
Top Co-Authors

Avatar

Minnie Yi-Miin Yen

University of Alaska Anchorage

View shared research outputs
Top Co-Authors

Avatar

Wendi Pan

University of Alabama in Huntsville

View shared research outputs
Researchain Logo
Decentralizing Knowledge