The case for quantum key distribution
From MaRDI portal
Publication:3064339
DOI10.1007/978-3-642-11731-2_35zbMATH Open1205.81075arXiv0902.2839OpenAlexW1546992648MaRDI QIDQ3064339FDOQ3064339
Authors: Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
Publication date: 21 December 2010
Published in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Search for Journal in Brave)
Abstract: Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.
Full work available at URL: https://arxiv.org/abs/0902.2839
Recommendations
Cites Work
- Title not available (Why is that?)
- New hash functions and their use in authentication and set equality
- Security of quantum key distribution with imperfect devices
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Using quantum key distribution for cryptographic purposes: a survey
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
- Title not available (Why is that?)
Cited In (12)
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
- Adaptive cascade
- Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Quantum key distribution in the classical authenticated key exchange framework
- Key distribution versus key enhancement in quantum cryptography
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Using quantum key distribution for cryptographic purposes: a survey
- Quantum cryptography beyond quantum key distribution
- Trusted quantum back bone leveraging secure communication
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
This page was built for publication: The case for quantum key distribution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3064339)