Attacks on quantum key distribution protocols that employ non-ITS authentication
From MaRDI portal
Publication:265393
DOI10.1007/S11128-015-1160-4zbMath1333.81124arXiv1209.0365OpenAlexW1517334679WikidataQ62114569 ScholiaQ62114569MaRDI QIDQ265393
F. Blanchet-Sadri, M. Dambrine
Publication date: 4 April 2016
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1209.0365
quantum key distributioncollision attacksinformation-theoretic securityman-in-the-middle attackmessage authentication
Related Items (3)
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Cryptanalysis and improvement of a quantum private set intersection protocol ⋮ Direct proof of security of Wegman-Carter authentication with partially known key
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Universal hashing and geometric codes
- Experimental quantum cryptography.
- New Universal Hash Functions
- Key Recycling in Authentication
- RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'"
- VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"
- On Fast and Provably Secure Message Authentication Based on Universal Hashing
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Probability Inequalities for Sums of Bounded Random Variables
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Attacks on quantum key distribution protocols that employ non-ITS authentication