Security of Covert Quantum Key Distribution under a Class of Coherent Attacks.
Mehrdad TahmasbiMatthieu R. BlochPublished in: CoRR (2019)
Keyphrases
- key distribution
- security protocols
- key management
- group communication
- private key
- authentication protocol
- fault tolerant
- diffie hellman
- security mechanisms
- key management scheme
- key exchange
- ad hoc networks
- wireless sensor networks
- secret key
- secure communication
- signcryption scheme
- information flow
- intrusion detection
- key agreement protocol
- key agreement
- security properties
- resource constrained
- provably secure
- elliptic curve
- network security
- low cost