Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution.
Zijian LiBingbing ZhengChengxian ZhangZhenrong ZhangHong-Bo XieKejin WeiPublished in: Quantum Inf. Process. (2024)
Keyphrases
- key distribution
- secret key
- key management
- authentication protocol
- key agreement
- group communication
- smart card
- session key
- secure communication
- private key
- key exchange
- diffie hellman
- key agreement protocol
- elliptic curve
- security protocols
- information security
- security properties
- authentication scheme
- public key
- signcryption scheme
- ciphertext
- wireless sensor networks
- security requirements
- ad hoc networks
- access control