Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/4780
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMosca, Michele-
dc.contributor.authorStebila, Douglas-
dc.contributor.authorUstaoğlu, Berkant-
dc.date.accessioned2017-02-02T07:26:22Z
dc.date.available2017-02-02T07:26:22Z
dc.date.issued2013
dc.identifier.citationMosca, M., Stebila, D., and Ustaoğlu, B. (2013). Quantum key distribution in the classical authenticated key exchange framework. Lecture Notes in Computer Science, 7932 LNCS, 136-154. doi:10.1007/978-3-642-38616-9_9en_US
dc.identifier.isbn9783642386152
dc.identifier.issn0302-9743
dc.identifier.issn0302-9743-
dc.identifier.issn1611-3349-
dc.identifier.urihttp://doi.org/10.1007/978-3-642-38616-9_9
dc.identifier.urihttp://hdl.handle.net/11147/4780
dc.description5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013 through 7 June 2013en_US
dc.description.abstractKey establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure. © 2013 Springer-Verlag.en_US
dc.language.isoenen_US
dc.publisherSpringer Verlagen_US
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectQuantum cryptographyen_US
dc.subjectAuthenticated key exchangeen_US
dc.subjectCryptographic protocolsen_US
dc.subjectSecurity modelen_US
dc.subjectQuantum key distributionen_US
dc.titleQuantum key distribution in the classical authenticated key exchange frameworken_US
dc.typeConference Objecten_US
dc.typeSubmitted Versionen_US
dc.authoridTR102756en_US
dc.contributor.departmentIzmir Institute of Technology. Mathematicsen_US
dc.identifier.volume7932 LNCSen_US
dc.identifier.startpage136en_US
dc.identifier.endpage154en_US
dc.identifier.wosWOS:000342981800009
dc.identifier.scopusSCOPUS:2-s2.0-84884492194
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1007/978-3-642-38616-9_9-
dc.relation.doi10.1007/978-3-642-38616-9_9en_US
dc.coverage.doi10.1007/978-3-642-38616-9_9en_US
item.cerifentitytypePublications-
item.cerifentitytypePublications-
item.grantfulltextopen-
item.fulltextWith Fulltext-
item.openairetypeConference Object-
item.openairetypeSubmitted Version-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.deptDepartment of Mathematics-
Appears in Collections:Mathematics / Matematik
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Sürdürülebilir Yeşil Kampüs Koleksiyonu / Sustainable Green Campus Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
4780.pdfConference Paper407.09 kBAdobe PDFThumbnail
View/Open
Show simple item record

CORE Recommender

SCOPUSTM   
Citations

9
checked on Sep 25, 2021

Page view(s)

24
checked on Sep 25, 2021

Download(s)

20
checked on Sep 25, 2021

Google ScholarTM

Check

Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.