QKD-Enhanced Cybersecurity Protocols

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classical Security Protocols for QKD Systems

The purpose of this report is to document the three principal classes of classic cryptographic protocols which are needed in systems for quantum key distribution. We will detail the protocols used for secret–key reconciliation by public discussion, privacy ampli…cation by public discussion, and unconditionally secure authentication. We suggest the use of the model checking method for the analys...

متن کامل

Enhancements to Prepare-and-Measure Based QKD Protocols

We propose some simple changes to a class of Quantum Key Distribution protocols. The first enhancement ensures early detection of any attempted Man-in-the-Middle attack and results in less leakage of key material to any eavesdropping attacker. We argue that this version is at least as secure as the original BB’84 scheme, but ensures a closer binding of the key establishment and authentication c...

متن کامل

A Novel Attack Strategy on Entanglement Swapping Qkd Protocols

Li et al. presented a protocol [Int. Journal of Quantum Information, Vol. 4, No. 6 (2006) 899-906] for quantum key distribution based on entanglement swapping. In this protocol they use random and certain bits to construct a classical key and they claim that this key is secure. In our article we show that the protocol by Li et al. is insecure presenting a new type of attack strategy which gives...

متن کامل

Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our pa...

متن کامل

Qkd Quantum Channel Authentication

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Photonics Journal

سال: 2021

ISSN: 1943-0655,1943-0647

DOI: 10.1109/jphot.2021.3069510