Trojan-horse attacks on quantum key distribution with classical Bob.
Yu-Guang YangSi-Jia SunQian-Qian ZhaoPublished in: Quantum Inf. Process. (2015)
Keyphrases
- key distribution
- security protocols
- quantum computation
- key management
- group communication
- quantum mechanics
- fault tolerant
- secret key
- authentication protocol
- resource constrained
- signature scheme
- elliptic curve
- private key
- security mechanisms
- data streams
- signcryption scheme
- cryptographic protocols
- key agreement protocol
- wireless sensor networks