Quantum Authentication with Key Recycling
From MaRDI portal
Publication:5270367
DOI10.1007/978-3-319-56617-7_12zbMath1415.94470arXiv1610.03422OpenAlexW2530225612MaRDI QIDQ5270367
Publication date: 23 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1610.03422
Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (9)
High-efficient quantum key agreement protocol with entanglement measure ⋮ Composable and finite computational security of quantum message transmission ⋮ Block encryption of quantum messages ⋮ Unnamed Item ⋮ High-dimensional quantum threshold anonymous identity authentication scheme ⋮ Comment on ``A novel quantum deniable authentication protocol without entanglement ⋮ Dispelling myths on superposition attacks: formal security model and attack analyses ⋮ A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice? ⋮ Quantum key distribution using universal hash functions over finite fields
Cites Work
- Unnamed Item
- Unnamed Item
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\)
- Quantum cryptography: public key distribution and coin tossing
- The combinatorics of authentication and secrecy codes
- New hash functions and their use in authentication and set equality
- Universal hashing and authentication codes
- Quantum non-malleability and authentication
- New security notions and feasibility results for authentication of quantum data
- Quantum One-Time Programs
- Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
- Actively Secure Two-Party Evaluation of Any Quantum Operation
- Efficient Simulation for Quantum Message Authentication
- Key Recycling in Authentication
- From Indifferentiability to Constructive Cryptography (and Back)
- Unconditionally Secure Key Distribution in Higher Dimensions by Depolarization
- Universally Composable Quantum Multi-party Computation
- Communication Theory of Secrecy Systems*
- Authentication Theory/Coding Theory
- Generalized privacy amplification
- Quantum Authentication and Encryption with Key Recycling
- A Quantum Cipher with Near Optimal Key-Recycling
- Theory of Cryptography
This page was built for publication: Quantum Authentication with Key Recycling