Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quantum transmission and measurement on a quantum channel, and classical post-processing on a public communication channel. It enjoys provable unconditional security provided that the public communication channel is immutable. Otherwise, QKD is vulnerable to a man-in-the-middle attack. Immutable public communication channels, however, do not exist in practice. So we need to use authentication that implements the properties of an immutable channel as well as possible. One scheme that serves this purpose well is the Wegman-Carter authentication (WCA), which is built upon Almost Strongly Universal2 (ASU2) hashing. This scheme uses a new key in each a...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Quantum key distribution (QKD), another name for quantum cryptography, is the most advanced subfield...
Security is the most tedious problem in highly sensitive communications. Quantum security is the key...
Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quant...
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). I...
Abstract. We study the security of a specific authentication procedure of interest in the context of...
Part 9: CryptographyInternational audienceQuantum Key Distribution (QKD) technology, based on princi...
Problem statement: In previous researches, we investigated the security of communication channels, w...
The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to jo...
Classical cryptography offers solutions for various applications like distributing keys, encryption,...
We give a new class of security definitions for authentication in the quantum setting. These definit...
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution...
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). ...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Quantum key distribution (QKD), another name for quantum cryptography, is the most advanced subfield...
Security is the most tedious problem in highly sensitive communications. Quantum security is the key...
Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quant...
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). I...
Abstract. We study the security of a specific authentication procedure of interest in the context of...
Part 9: CryptographyInternational audienceQuantum Key Distribution (QKD) technology, based on princi...
Problem statement: In previous researches, we investigated the security of communication channels, w...
The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to jo...
Classical cryptography offers solutions for various applications like distributing keys, encryption,...
We give a new class of security definitions for authentication in the quantum setting. These definit...
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution...
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). ...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
Quantum key distribution (QKD), another name for quantum cryptography, is the most advanced subfield...
Security is the most tedious problem in highly sensitive communications. Quantum security is the key...