Unconditionally secure key - agreement : two case studies
نویسندگان
چکیده
منابع مشابه
Enhanced usage of keys obtained by physical, unconditionally secure distributions
Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics....
متن کاملA method of Authentication for Quantum Networks
Quantum cryptography offers a way of key agreement, which is unbreakable by an eavesdropping adversary. Authentication is of crucial importance, as perfect secrecy is worthless if the identity of the addressee cannot be ensured before sending important information. Message authentication has been studied thoroughly, but no approach seems to be able to explicitly counter meet-in-the-middle imper...
متن کاملUnconditionally Secure Multipartite Quantum Key Distribution
We consider the problem of secure key distribution among n trustful agents: the goal is to distribute an identical random bit-string among the n agents over a noisy channel such that eavesdroppers learn little about it. We study the general situation where the only resources required are secure bipartite key distribution and authenticated classical communication. Accordingly, multipartite quant...
متن کاملAmpli cation
This paper provides a general treatment of privacy ampliication by public discussion , a concept introduced by Bennett, Brassard and Robert for a special scenario. Privacy ampliication is a protocol that allows two parties to distill a secret key from a common random variable that is only partially secret, i.e. about which an eavesdropper has some partial information , where the two parties gen...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل