Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectra...

Full description

Bibliographic Details
Main Author: Djordjevic, Ivan B.
Format: eBook
Language:English
Published: Basel 2022
Subjects:
N/a
Qkd
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 04606nma a2200985 u 4500
001 EB002131367
003 EBX01000000000000001269424
005 00000000000000.0
007 cr|||||||||||||||||||||
008 221110 ||| eng
020 |a books978-3-0365-5004-6 
020 |a 9783036550039 
020 |a 9783036550046 
100 1 |a Djordjevic, Ivan B. 
245 0 0 |a Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography  |h Elektronische Ressource 
260 |a Basel  |c 2022 
300 |a 1 electronic resource (210 p.) 
653 |a measurement device independent 
653 |a underwater channel 
653 |a EPR pairs 
653 |a detection probability 
653 |a postquantum cryptography (PQC) 
653 |a discrete variable (DV)-QKD 
653 |a private equality tests 
653 |a n/a 
653 |a algorithm 
653 |a secret key distillation 
653 |a pilot randomization 
653 |a quantum identity authentication 
653 |a vulnerability 
653 |a amplification 
653 |a History of engineering and technology / bicssc 
653 |a twin-field quantum key distribution 
653 |a physical layer security 
653 |a universal composability 
653 |a conclusive exclusion 
653 |a Bayesian statistics 
653 |a reconciliation 
653 |a quantum network 
653 |a injection attacks 
653 |a Technology: general issues / bicssc 
653 |a continuous variable (CV)-QKD 
653 |a quantum key distribution (QKD) 
653 |a discrete phase randomization 
653 |a geometrical optics restricted eavesdropping 
653 |a clock synchronization 
653 |a information disturbance theorem 
653 |a mean multi-kings' problem 
653 |a quantum communications 
653 |a mean-king's problem 
653 |a zero-photon catalysis 
653 |a jamming attacks 
653 |a measurement-device-independent 
653 |a quantum cryptography 
653 |a phase-matching 
653 |a quantum entanglement 
653 |a secret key generation 
653 |a oblivious transfer 
653 |a surface codes 
653 |a entanglement 
653 |a intrinsic bit error rate 
653 |a continuous-variable quantum key distribution 
653 |a quantum communications networks (QCNs) 
653 |a single-photon mode 
653 |a the Bernstein-Vazirani algorithm 
653 |a post-quantum cryptography 
653 |a satellite-to-satellite 
653 |a quantum key distribution 
653 |a synchronization 
653 |a quantum information theory 
653 |a QKD 
653 |a distillation 
700 1 |a Djordjevic, Ivan B. 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/ 
028 5 0 |a 10.3390/books978-3-0365-5004-6 
856 4 0 |u https://www.mdpi.com/books/pdfview/book/5957  |7 0  |x Verlag  |3 Volltext 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/92081  |z DOAB: description of the publication 
082 0 |a 900 
082 0 |a 000 
082 0 |a 380 
082 0 |a 600 
082 0 |a 620 
520 |a The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled "Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography" was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.