Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption".
Nayana DasGoutam PaulPublished in: CoRR (2020)
Keyphrases
- virtual private network
- data acquisition
- encryption algorithms
- security properties
- key management
- network communication
- encryption scheme
- secure communication
- high security
- data encryption
- encryption decryption
- communication protocols
- identity authentication
- key exchange
- encryption algorithm
- security analysis
- secret key
- resource constrained
- measurement data
- integrity verification
- network management
- group communication
- digital rights management
- elliptic curve cryptography
- access control
- cryptographic protocols
- public key cryptography
- security protocols
- stream cipher
- public key
- computer networks
- single point of failure
- third party
- low cost
- image encryption
- security issues
- rfid tags
- communication systems
- security requirements
- security policies
- private key
- key distribution
- quantum computing
- sensitive data
- security mechanisms
- information sharing
- cryptographic algorithms
- statistical databases
- security model
- mutual authentication
- data confidentiality
- wireless sensor networks
- information security
- data protection
- ad hoc networks
- communication networks
- diffie hellman
- network security
- physical layer