QKD-Enhanced Cybersecurity Protocols
نویسندگان
چکیده
منابع مشابه
Classical Security Protocols for QKD Systems
The purpose of this report is to document the three principal classes of classic cryptographic protocols which are needed in systems for quantum key distribution. We will detail the protocols used for secretkey reconciliation by public discussion, privacy ampli cation by public discussion, and unconditionally secure authentication. We suggest the use of the model checking method for the analys...
متن کاملEnhancements to Prepare-and-Measure Based QKD Protocols
We propose some simple changes to a class of Quantum Key Distribution protocols. The first enhancement ensures early detection of any attempted Man-in-the-Middle attack and results in less leakage of key material to any eavesdropping attacker. We argue that this version is at least as secure as the original BB’84 scheme, but ensures a closer binding of the key establishment and authentication c...
متن کاملA Novel Attack Strategy on Entanglement Swapping Qkd Protocols
Li et al. presented a protocol [Int. Journal of Quantum Information, Vol. 4, No. 6 (2006) 899-906] for quantum key distribution based on entanglement swapping. In this protocol they use random and certain bits to construct a classical key and they claim that this key is secure. In our article we show that the protocol by Li et al. is insecure presenting a new type of attack strategy which gives...
متن کاملFinite-key security analyses on passive decoy-state QKD protocols with different unstable sources
In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our pa...
متن کاملQkd Quantum Channel Authentication
Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Photonics Journal
سال: 2021
ISSN: 1943-0655,1943-0647
DOI: 10.1109/jphot.2021.3069510