Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Applied Sciences  /  Vol: 14 Par: 1 (2024)  /  Artículo
ARTÍCULO
TITULO

Quantum Key Distribution with Post-Processing Driven by Physical Unclonable Functions

Georgios M. Nikolopoulos and Marc Fischlin    

Resumen

Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used mainly for authentication purposes in the post-processing of classical data that have been obtained during the quantum communication stage, and it prevents a man-in-the-middle attack. The necessity of a pre-shared key is usually considered to be the main drawback of quantum key distribution protocols, and it becomes even stronger for large networks involving more than two users. Here, we discuss the conditions under which physical unclonable functions can be integrated in currently available quantum key distribution systems in order to facilitate the generation and the distribution of the necessary pre-shared key with the smallest possible cost in the security of the systems. Moreover, the integration of physical unclonable functions in quantum key distribution networks allows for real-time authentication of the devices that are connected to the network.

 Artículos similares

       
 
Yongseok Lee, Jonghee Youn, Kevin Nam, Hyunyoung Oh and Yunheung Paek    
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography. The NTRU-KEM, while ... ver más
Revista: Computers

 
Gabriel M. Carral, Jesús Liñares, Eduardo F. Mateo and Xesús Prieto-Blanco    
We analyze autocompensation possibilities in entanglement-based QKD protocols. In particular, we study the seminal BBM92 protocol and find that an autocompensating technique is possible, although with severe limitations. This prompts the introduction of ... ver más
Revista: Applied Sciences

 
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más

 
Marin Vidakovic and Kruno Milicevic    
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals... ver más
Revista: Algorithms

 
Ming Yang, Haoliang Chang, Jinhuan Chen and Xinyu Zhu    
A photodetector is a type of optoelectronic device with excellent photoelectric conversion abilities, which has especially important applications in many fields such as optical communication, image sensing, aerospace/environmental detection, and military... ver más
Revista: Coatings