Quantum Key Distribution with Post-Processing Driven by Physical Unclonable Functions
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used mainly for authentication purposes in the pos...
Main Authors: | Georgios M. Nikolopoulos, Marc Fischlin |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2024-01-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/14/1/464 |
Similar Items
-
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
by: Lukas Fladung, et al.
Published: (2019-10-01) -
Remote Quantum-Safe Authentication of Entities with Physical Unclonable Functions
by: Georgios M. Nikolopoulos
Published: (2021-07-01) -
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function
by: Brit Riggs, et al.
Published: (2022-07-01) -
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
by: Bertrand Cambou, et al.
Published: (2021-03-01) -
iAKA-CIoT: An Improved Authentication and Key Agreement Scheme for Cloud Enabled Internet of Things Using Physical Unclonable Function
by: Kisung Park, et al.
Published: (2022-08-01)