Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectra...

Full description

Saved in:
Bibliographic Details
Other Authors: Djordjevic, Ivan B. (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel 2022
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_92081
005 20220916
003 oapen
006 m o d
007 cr|mn|---annan
008 20220916s2022 xx |||||o ||| 0|eng d
020 |a books978-3-0365-5004-6 
020 |a 9783036550039 
020 |a 9783036550046 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-5004-6  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a TB  |2 bicssc 
072 7 |a TBX  |2 bicssc 
100 1 |a Djordjevic, Ivan B.  |4 edt 
700 1 |a Djordjevic, Ivan B.  |4 oth 
245 1 0 |a Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography 
260 |a Basel  |c 2022 
300 |a 1 electronic resource (210 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled "Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography" was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
650 7 |a History of engineering & technology  |2 bicssc 
653 |a continuous-variable quantum key distribution 
653 |a measurement device independent 
653 |a zero-photon catalysis 
653 |a underwater channel 
653 |a quantum key distribution (QKD) 
653 |a discrete variable (DV)-QKD 
653 |a continuous variable (CV)-QKD 
653 |a postquantum cryptography (PQC) 
653 |a quantum communications networks (QCNs) 
653 |a quantum communications 
653 |a entanglement 
653 |a surface codes 
653 |a quantum cryptography 
653 |a quantum key distribution 
653 |a quantum network 
653 |a measurement-device-independent 
653 |a mean-king's problem 
653 |a mean multi-kings' problem 
653 |a information disturbance theorem 
653 |a QKD 
653 |a distillation 
653 |a amplification 
653 |a reconciliation 
653 |a quantum identity authentication 
653 |a private equality tests 
653 |a conclusive exclusion 
653 |a single-photon mode 
653 |a synchronization 
653 |a algorithm 
653 |a detection probability 
653 |a vulnerability 
653 |a twin-field quantum key distribution 
653 |a phase-matching 
653 |a discrete phase randomization 
653 |a intrinsic bit error rate 
653 |a the Bernstein-Vazirani algorithm 
653 |a EPR pairs 
653 |a quantum entanglement 
653 |a quantum information theory 
653 |a geometrical optics restricted eavesdropping 
653 |a secret key distillation 
653 |a satellite-to-satellite 
653 |a physical layer security 
653 |a secret key generation 
653 |a injection attacks 
653 |a jamming attacks 
653 |a pilot randomization 
653 |a clock synchronization 
653 |a Bayesian statistics 
653 |a oblivious transfer 
653 |a post-quantum cryptography 
653 |a universal composability 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/5957  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/92081  |7 0  |z DOAB: description of the publication