The security of SARG04 protocol in plug and play QKD system with an untrusted source.
Bingjie XuXiang PengHong GuoPublished in: Quantum Inf. Comput. (2012)
Keyphrases
- security policies
- cryptographic protocols
- privacy preserving
- security protocols
- secure multiparty computation
- authentication protocol
- key agreement protocol
- security properties
- key exchange protocol
- ban logic
- sensitive data
- security model
- homomorphic encryption
- formal analysis
- information security
- security requirements
- security analysis
- access control
- denial of service attacks
- communication protocols
- rfid systems
- mutual authentication
- lightweight
- key distribution
- network security
- security issues
- trusted third party
- scalar product
- key agreement
- intrusion detection
- physical layer
- secure routing
- third party
- provably secure
- medium access control
- mobile payment
- diffie hellman
- data privacy
- protocol specification
- blind signature
- key exchange
- virtual private network
- public key
- mobile agent system
- security services
- encryption scheme
- key management
- contractual obligations
- communication protocol
- smart card
- key establishment
- data storage
- encrypted data
- secure communication
- network layer
- secret key