The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific and industrial communities. Based on principles of quantum mechanics, it can provide unconditional security in key exchanges over end-to-end communication channels. Information-theoretically secure (ITS) authentication, the compulsory procedure of QKD systems, avoids the man-in-the-middle attack during the security key generation. In this paper, we propose a novel family of almost strongly universal (ASU) hash functions based on number-theoretic transforms (N-ASU), and prove that N-ASU hash functions can meet the high security requirement of an ITS authentication procedure. With such N-ASU hash functions, we propose a novel efficient NTT-bas...
Classical cryptography is mainly about the challenge to compute the secret key using current computi...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
In today’s era of internet and network application, need for security has become of vital importance...
The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific...
Part 9: CryptographyInternational audienceQuantum Key Distribution (QKD) technology, based on princi...
Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quant...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). I...
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution...
Abstract. We study the security of a specific authentication procedure of interest in the context of...
Security is the most tedious problem in highly sensitive communications. Quantum security is the key...
We propose a quantum key distribution protocol with quantum based user authentication. User authenti...
Data protection and information security have been the essence of communication in today's digital e...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
Classical cryptography is mainly about the challenge to compute the secret key using current computi...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
In today’s era of internet and network application, need for security has become of vital importance...
The quantum key distribution (QKD) technology is achieving a growing interest in both the scientific...
Part 9: CryptographyInternational audienceQuantum Key Distribution (QKD) technology, based on princi...
Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quant...
Problem statement: In previous researches, we investigated the security of communication channels, w...
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). I...
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution...
Abstract. We study the security of a specific authentication procedure of interest in the context of...
Security is the most tedious problem in highly sensitive communications. Quantum security is the key...
We propose a quantum key distribution protocol with quantum based user authentication. User authenti...
Data protection and information security have been the essence of communication in today's digital e...
Secure data transmissions are crucial part of modern cloud services and data infrastructures. Securi...
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on j...
Classical cryptography is mainly about the challenge to compute the secret key using current computi...
The quantum communication technology is an evolving design which connects multiple quantum enabled d...
In today’s era of internet and network application, need for security has become of vital importance...