Security of ping-pong protocol based on pairs of completely entangled qudits.
Piotr ZawadzkiPublished in: Quantum Inf. Process. (2012)
Keyphrases
- ping pong
- cryptographic protocols
- security protocols
- key agreement protocol
- authentication protocol
- ban logic
- security properties
- security analysis
- formal analysis
- key exchange protocol
- security model
- key agreement
- key distribution
- communication protocols
- key management
- denial of service attacks
- pairwise
- mutual authentication
- cryptographic algorithms
- rfid systems
- security requirements
- network security
- security mechanisms
- security policies
- mobile payment
- group communication
- messages exchanged
- security issues
- information security
- virtual private network
- electronic voting
- protocol specification
- provably secure
- lightweight
- key exchange
- security services
- diffie hellman
- statistical databases
- elliptic curve
- contractual obligations
- homomorphic encryption
- key establishment
- public key
- resource constrained
- medium access control
- trust negotiation
- security problems
- encryption scheme
- standard model
- privacy protection
- application layer
- trusted third party
- smart card
- secure multiparty computation
- wireless networks
- intrusion detection