Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station.
Mario StipcevicPublished in: Entropy (2023)
Keyphrases
- key distribution
- security protocols
- key management
- authentication protocol
- group communication
- cryptographic protocols
- fault tolerant
- key agreement protocol
- secret key
- private key
- elliptic curve
- key exchange
- diffie hellman
- denial of service attacks
- security properties
- secure routing
- smart card
- lightweight
- security mechanisms
- signature scheme
- session key
- key agreement
- wireless sensor networks
- signcryption scheme
- network security
- ad hoc networks
- key management scheme
- wireless ad hoc networks
- security issues
- secure communication
- wireless networks
- provably secure