Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
Lukas FladungGeorgios M. NikolopoulosGernot AlberMarc FischlinPublished in: CoRR (2019)
Keyphrases
- authentication protocol
- continuous variables
- security protocols
- secret key
- cryptographic protocols
- smart card
- hash functions
- dynamic systems
- public key
- security mechanisms
- bayesian networks
- security analysis
- structure learning
- authentication scheme
- private key
- key distribution
- lightweight
- rfid tags
- hidden variables
- random variables
- joint distribution
- computationally expensive