Security of Quantum Key Distribution from Attacker's View.
Takehisa IwakoshiPublished in: CoRR (2017)
Keyphrases
- key distribution
- key management
- key pre distribution
- fault tolerant
- group communication
- private key
- authentication protocol
- secret key
- security protocols
- elliptic curve
- key exchange
- ad hoc networks
- signcryption scheme
- key agreement protocol
- signature scheme
- resource constrained
- key agreement
- secure communication
- security analysis
- smart card
- wireless sensor networks
- diffie hellman
- key management scheme
- public key
- real time
- wireless ad hoc networks
- information systems
- digital libraries
- intrusion detection
- digital signature