Quantum key distribution in the classical authenticated key exchange framework
From MaRDI portal
Publication:4928593
DOI10.1007/978-3-642-38616-9_9zbMATH Open1306.94105arXiv1206.6150OpenAlexW1929950373MaRDI QIDQ4928593FDOQ4928593
Authors: Michele Mosca, Douglas Stebila, Berkant Ustaoglu
Publication date: 14 June 2013
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Abstract: Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it allows two parties using only public authenticated communication to establish a secret session key which can be used to encrypt messages. But if the session key is compromised, the confidentiality of encrypted messages is typically compromised as well. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, however, which is most easily achieved using computationally secure digital signature schemes. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution based on traditional classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Full work available at URL: https://arxiv.org/abs/1206.6150
Recommendations
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cited In (25)
- Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
- Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
- Adaptive cascade
- Improving classical authentication over a quantum channel
- Provably secure key establishment against quantum adversaries
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Title not available (Why is that?)
- Categorical quantum cryptography for access control in cloud computing
- A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks
- Pauli half spinning and elliptic curve based information confidentiality mechanism
- Wireless-channel key exchange
- Verifiable quantum key exchange with authentication
- Group key establishment in a quantum-future scenario
- Quantum key distribution in large scale quantum network assisted by classical routing information
- Quantum Authenticated Key Distribution
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- Transferable quantum cheque scheme based on quantum public-key cryptography
- Using quantum key distribution for cryptographic purposes: a survey
- Efficient quantum key distribution protocol based on classical-quantum polarized channels
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
- Key establishment à la Merkle in a quantum world
- The case for quantum key distribution
- Quantum key evolution and its applications
- Game theoretic security framework for quantum key distribution
This page was built for publication: Quantum key distribution in the classical authenticated key exchange framework
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4928593)