Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
| dc.contributor.author | Mosca, Michele | |
| dc.contributor.author | Stebila, Douglas | |
| dc.contributor.author | Ustaoğlu, Berkant | |
| dc.coverage.doi | 10.1007/978-3-642-38616-9_9 | |
| dc.date.accessioned | 2017-02-02T07:26:22Z | |
| dc.date.available | 2017-02-02T07:26:22Z | |
| dc.date.issued | 2013 | |
| dc.description | 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013 through 7 June 2013 | en_US |
| dc.description.abstract | Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure. © 2013 Springer-Verlag. | en_US |
| dc.identifier.citation | Mosca, M., Stebila, D., and Ustaoğlu, B. (2013). Quantum key distribution in the classical authenticated key exchange framework. Lecture Notes in Computer Science, 7932 LNCS, 136-154. doi:10.1007/978-3-642-38616-9_9 | en_US |
| dc.identifier.doi | 10.1007/978-3-642-38616-9_9 | |
| dc.identifier.doi | 10.1007/978-3-642-38616-9_9 | en_US |
| dc.identifier.isbn | 9783642386152 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.issn | 1611-3349 | |
| dc.identifier.scopus | 2-s2.0-84884492194 | |
| dc.identifier.uri | http://doi.org/10.1007/978-3-642-38616-9_9 | |
| dc.identifier.uri | https://hdl.handle.net/11147/4780 | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer | en_US |
| dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Quantum cryptography | en_US |
| dc.subject | Authenticated key exchange | en_US |
| dc.subject | Cryptographic protocols | en_US |
| dc.subject | Security model | en_US |
| dc.subject | Quantum key distribution | en_US |
| dc.title | Quantum Key Distribution in the Classical Authenticated Key Exchange Framework | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.institutional | Ustaoğlu, Berkant | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C4 | |
| gdc.bip.popularityclass | C4 | |
| gdc.coar.access | open access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | İzmir Institute of Technology. Mathematics | en_US |
| gdc.description.endpage | 154 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | Q3 | |
| gdc.description.startpage | 136 | en_US |
| gdc.description.volume | 7932 LNCS | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W1929950373 | |
| gdc.identifier.wos | WOS:000342981800009 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 3.0 | |
| gdc.oaire.influence | 5.6730367E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.keywords | Authenticated key exchange | |
| gdc.oaire.keywords | Security model | |
| gdc.oaire.keywords | Quantum Physics | |
| gdc.oaire.keywords | Quantum cryptography | |
| gdc.oaire.keywords | E.3 | |
| gdc.oaire.keywords | Quantum key distribution | |
| gdc.oaire.keywords | FOS: Physical sciences | |
| gdc.oaire.keywords | 81P94, 94A60 | |
| gdc.oaire.keywords | Cryptographic protocols | |
| gdc.oaire.keywords | Quantum Physics (quant-ph) | |
| gdc.oaire.popularity | 1.7965908E-8 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0103 physical sciences | |
| gdc.oaire.sciencefields | 0102 computer and information sciences | |
| gdc.oaire.sciencefields | 01 natural sciences | |
| gdc.openalex.collaboration | International | |
| gdc.openalex.fwci | 2.30914038 | |
| gdc.openalex.normalizedpercentile | 0.89 | |
| gdc.openalex.toppercent | TOP 10% | |
| gdc.opencitations.count | 26 | |
| gdc.plumx.crossrefcites | 12 | |
| gdc.plumx.mendeley | 55 | |
| gdc.plumx.scopuscites | 26 | |
| gdc.scopus.citedcount | 26 | |
| gdc.wos.citedcount | 25 | |
| relation.isAuthorOfPublication.latestForDiscovery | e58ceea7-82b9-4d8c-a531-02cb47780412 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 9af2b05f-28ac-4012-8abe-a4dfe192da5e |
