Feedback

X
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

0 Ungluers have Faved this Work
The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 36 times via unglue.it ebook links.
  1. 36 - pdf (CC BY) at Unglue.it.

Keywords

  • Algorithm
  • amplification
  • bayesian statistics
  • clock synchronization
  • conclusive exclusion
  • continuous variable (CV)-QKD
  • continuous-variable quantum key distribution
  • detection probability
  • discrete phase randomization
  • discrete variable (DV)-QKD
  • Distillation
  • entanglement
  • EPR pairs
  • geometrical optics restricted eavesdropping
  • History of engineering & technology
  • information disturbance theorem
  • injection attacks
  • intrinsic bit error rate
  • jamming attacks
  • mean multi-kings’ problem
  • mean-king’s problem
  • measurement device independent
  • measurement-device-independent
  • n/a
  • oblivious transfer
  • phase-matching
  • physical layer security
  • pilot randomization
  • post-quantum cryptography
  • postquantum cryptography (PQC)
  • private equality tests
  • QKD
  • quantum communications
  • quantum communications networks (QCNs)
  • quantum cryptography
  • quantum entanglement
  • quantum identity authentication
  • quantum information theory
  • quantum key distribution
  • quantum key distribution (QKD)
  • quantum network
  • Reconciliation
  • satellite-to-satellite
  • secret key distillation
  • secret key generation
  • single-photon mode
  • surface codes
  • Synchronization
  • Technology, engineering, agriculture
  • Technology: general issues
  • the Bernstein-Vazirani algorithm
  • twin-field quantum key distribution
  • underwater channel
  • universal composability
  • vulnerability
  • zero-photon catalysis

Links

DOI: 10.3390/books978-3-0365-5004-6

Editions

edition cover

Share

Copy/paste this into your site: