How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
Mladen PavicicPublished in: Entropy (2021)
Keyphrases
- ping pong
- cryptographic protocols
- security protocols
- key distribution
- key exchange
- authentication protocol
- key establishment
- secure multiparty computation
- multi party
- security properties
- key agreement protocol
- language model
- security services
- key management
- homomorphic encryption
- application level
- public key cryptosystems
- language modeling
- privacy preserving
- sensor networks
- security analysis
- security mechanisms
- communication protocols
- security issues
- standard model
- group communication
- security requirements
- trusted third party
- lightweight
- private key
- rfid tags
- wireless sensor networks