Jul 1, 2016 · In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for ...
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged ...
Sep 1, 2016 · The security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and ...
“Study on the security of the authentication scheme with key recycling in QKD” is a paper by Qiong Li Qiang Zhao Dan Le Xiamu Niu published in 2016. It has an ...
Study on the security of the authentication scheme with key recycling in QKD · List of references · Publications that cite this publication.
Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. QKR protocols can achieve better round ...
Study on the security of the authentication scheme with key recycling in QKD ... Security of Authentication with a Fixed Key in Quantum Key Distribution.
For instance, encryption with key recycling is (almost) non-interactive and requires only 1 bit of authenticated feedback: “accept” or “reject”, that can be ...
Sep 29, 2014 · The authentication scheme with key recycling studied in this work can thus be used by a QKD protocol. We show that simply by learning if a ...
Publications ; Study on the security of the authentication scheme with key recycling in QKD · Sep 2016 · Qiang Zhao · Dan Le ; Decoding schedule generating method ...