Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

dc.contributor.author Mosca, Michele
dc.contributor.author Stebila, Douglas
dc.contributor.author Ustaoğlu, Berkant
dc.coverage.doi 10.1007/978-3-642-38616-9_9
dc.date.accessioned 2017-02-02T07:26:22Z
dc.date.available 2017-02-02T07:26:22Z
dc.date.issued 2013
dc.description 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013 through 7 June 2013 en_US
dc.description.abstract Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure. © 2013 Springer-Verlag. en_US
dc.identifier.citation Mosca, M., Stebila, D., and Ustaoğlu, B. (2013). Quantum key distribution in the classical authenticated key exchange framework. Lecture Notes in Computer Science, 7932 LNCS, 136-154. doi:10.1007/978-3-642-38616-9_9 en_US
dc.identifier.doi 10.1007/978-3-642-38616-9_9
dc.identifier.doi 10.1007/978-3-642-38616-9_9 en_US
dc.identifier.isbn 9783642386152
dc.identifier.issn 0302-9743
dc.identifier.issn 1611-3349
dc.identifier.scopus 2-s2.0-84884492194
dc.identifier.uri http://doi.org/10.1007/978-3-642-38616-9_9
dc.identifier.uri https://hdl.handle.net/11147/4780
dc.language.iso en en_US
dc.publisher Springer en_US
dc.relation.ispartof Lecture Notes in Computer Science en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Quantum cryptography en_US
dc.subject Authenticated key exchange en_US
dc.subject Cryptographic protocols en_US
dc.subject Security model en_US
dc.subject Quantum key distribution en_US
dc.title Quantum Key Distribution in the Classical Authenticated Key Exchange Framework en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.institutional Ustaoğlu, Berkant
gdc.bip.impulseclass C5
gdc.bip.influenceclass C4
gdc.bip.popularityclass C4
gdc.coar.access open access
gdc.coar.type text::conference output
gdc.collaboration.industrial false
gdc.description.department İzmir Institute of Technology. Mathematics en_US
gdc.description.endpage 154 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q3
gdc.description.startpage 136 en_US
gdc.description.volume 7932 LNCS en_US
gdc.description.wosquality N/A
gdc.identifier.openalex W1929950373
gdc.identifier.wos WOS:000342981800009
gdc.index.type WoS
gdc.index.type Scopus
gdc.oaire.diamondjournal false
gdc.oaire.impulse 3.0
gdc.oaire.influence 5.6730367E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Authenticated key exchange
gdc.oaire.keywords Security model
gdc.oaire.keywords Quantum Physics
gdc.oaire.keywords Quantum cryptography
gdc.oaire.keywords E.3
gdc.oaire.keywords Quantum key distribution
gdc.oaire.keywords FOS: Physical sciences
gdc.oaire.keywords 81P94, 94A60
gdc.oaire.keywords Cryptographic protocols
gdc.oaire.keywords Quantum Physics (quant-ph)
gdc.oaire.popularity 1.7965908E-8
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0103 physical sciences
gdc.oaire.sciencefields 0102 computer and information sciences
gdc.oaire.sciencefields 01 natural sciences
gdc.openalex.collaboration International
gdc.openalex.fwci 2.30914038
gdc.openalex.normalizedpercentile 0.89
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 26
gdc.plumx.crossrefcites 12
gdc.plumx.mendeley 55
gdc.plumx.scopuscites 26
gdc.scopus.citedcount 26
gdc.wos.citedcount 25
relation.isAuthorOfPublication.latestForDiscovery e58ceea7-82b9-4d8c-a531-02cb47780412
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4012-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
4780.pdf
Size:
407.09 KB
Format:
Adobe Portable Document Format
Description:
Conference Paper

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: