Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states.
Marcos CurtyLucy Liuxuan ZhangHoi-Kwong LoNorbert LütkenhausPublished in: Quantum Inf. Comput. (2007)
Keyphrases
- phase shift
- key distribution
- security protocols
- key management
- fault tolerant
- authentication protocol
- secret key
- group communication
- watermarking scheme
- elliptic curve
- wireless ad hoc networks
- private key
- end to end
- signcryption scheme
- security mechanisms
- ad hoc networks
- cryptographic protocols
- security properties
- signature scheme
- data distribution
- key management scheme