Attacks on quantum key distribution protocols that employ non-ITS authentication
Christoph PacherAysajan AbidinThomas LorünserMomtchil PeevRupert UrsinAnton ZeilingerJan-Åke LarssonPublished in: CoRR (2012)
Keyphrases
- key distribution
- security protocols
- authentication protocol
- key management
- fault tolerant
- cryptographic protocols
- secret key
- group communication
- key exchange
- security services
- private key
- symmetric key
- security mechanisms
- signature scheme
- security properties
- watermarking scheme
- authentication scheme
- ad hoc networks
- diffie hellman
- wireless ad hoc networks
- smart card
- secure communication
- wireless sensor networks
- provably secure
- key agreement protocol
- data streams