The case for quantum key distribution
From MaRDI portal
Publication:3064339
Abstract: Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.
Recommendations
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- scientific article; zbMATH DE number 1024101 (Why is no real title available?)
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
- New hash functions and their use in authentication and set equality
- Security of quantum key distribution with imperfect devices
- Using quantum key distribution for cryptographic purposes: a survey
Cited in
(12)- Trusted quantum back bone leveraging secure communication
- Key distribution versus key enhancement in quantum cryptography
- Quantum cryptography beyond quantum key distribution
- Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Adaptive cascade
- Quantum key distribution in the classical authenticated key exchange framework
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
- Using quantum key distribution for cryptographic purposes: a survey
This page was built for publication: The case for quantum key distribution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3064339)