Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator.
Weilong WangXiangdong MengYangyang FeiZhi MaPublished in: Quantum Inf. Process. (2020)
Keyphrases
- security analysis
- high security
- authentication protocol
- security requirements
- mutual authentication
- private key
- security properties
- smart card
- security model
- secure electronic
- key exchange
- public key
- image encryption
- elliptic curve cryptography
- encryption algorithm
- user authentication
- encryption scheme
- diffie hellman