Show simple item record

dc.contributor.authorRyan, Peter Y.A.
dc.contributor.authorChristianson, B.
dc.date.accessioned2014-04-14T15:00:19Z
dc.date.available2014-04-14T15:00:19Z
dc.date.issued2013
dc.identifier.citationRyan , P Y A & Christianson , B 2013 , Enhancements to Prepare-and-Measure Based QKD Protocols . in Security Protocols XXI . Lecture Notes in Computer Science , vol. 8263 , Springer , pp. 123-133 , The Twenty-first International Workshop on Security Protocols , Cambridge , United Kingdom , 19/03/13 . https://doi.org/10.1007/978-3-642-41717-7_14
dc.identifier.citationconference
dc.identifier.isbn978-3-642-41716-7
dc.identifier.isbn978-3-642-41717-7
dc.identifier.otherPURE: 2945415
dc.identifier.otherPURE UUID: 2fcc0316-2cb5-4b2d-a3ec-be6845855a2b
dc.identifier.otherScopus: 84893356487
dc.identifier.urihttp://hdl.handle.net/2299/13357
dc.description.abstractWe propose some simple changes to a class of Quantum Key Distribution protocols. The first enhancement ensures early detection of any attempted Man-in-the-Middle attack and results in less leakage of key material to any eavesdropping attacker. We argue that this version is at least as secure as the original BB’84 scheme, but ensures a closer binding of the key establishment and authentication components of the protocol. Further proposed enhancements lead to a doubling of the key rate, but the security arguments become more delicate. We also touch on the need to enhance the models used to analyze both the classical and quantum aspects of QKD protocols. This is prompted by the observation that existing analyses treat the quantum (key-establishment) and classical (authentication etc) phases separately and then combine them in a simple-minded fashion.en
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofSecurity Protocols XXI
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.titleEnhancements to Prepare-and-Measure Based QKD Protocolsen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.relation.schoolSchool of Computer Science
rioxxterms.versionofrecordhttps://doi.org/10.1007/978-3-642-41717-7_14
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.rights.accesstyperestrictedAccess


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record