Key Recycling in Authentication
From MaRDI portal
Publication:2986298
DOI10.1109/TIT.2014.2317312zbMath1360.94327arXiv1202.1229MaRDI QIDQ2986298
Publication date: 16 May 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1202.1229
Related Items (11)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ Distributing secret keys with quantum continuous variables: principle, security and implementations ⋮ Study on the security of the authentication scheme with key recycling in QKD ⋮ Quantum key distribution scheme with key recycling in integrated optical network ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Implementation of quantum key distribution network simulation module in the network simulator NS-3 ⋮ Key-leakage evaluation of authentication in quantum key distribution with finite resources ⋮ Direct proof of security of Wegman-Carter authentication with partially known key ⋮ Quantum key distribution using universal hash functions over finite fields ⋮ Quantum and semi-quantum sealed-bid auction: vulnerabilities and advantages ⋮ Quantum Authentication with Key Recycling
This page was built for publication: Key Recycling in Authentication