Attacks on quantum key distribution protocols that employ non-ITS authentication.
Christoph PacherAysajan AbidinThomas LorünserMomtchil PeevRupert UrsinAnton ZeilingerJan-Åke LarssonPublished in: Quantum Inf. Process. (2016)
Keyphrases
- key distribution
- security protocols
- key management
- authentication protocol
- fault tolerant
- group communication
- secret key
- security mechanisms
- cryptographic protocols
- elliptic curve
- private key
- symmetric key
- key exchange
- security services
- wireless sensor networks
- secure communication
- wireless ad hoc networks
- watermarking scheme
- security properties
- authentication scheme
- diffie hellman
- resource constrained
- rfid tags
- user authentication
- digital signature
- ad hoc networks
- fault tolerance
- key agreement protocol
- key management scheme
- session key
- key establishment