|
|
|
|
LEADER |
04606nma a2200985 u 4500 |
001 |
EB002131367 |
003 |
EBX01000000000000001269424 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
221110 ||| eng |
020 |
|
|
|a books978-3-0365-5004-6
|
020 |
|
|
|a 9783036550039
|
020 |
|
|
|a 9783036550046
|
100 |
1 |
|
|a Djordjevic, Ivan B.
|
245 |
0 |
0 |
|a Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
|h Elektronische Ressource
|
260 |
|
|
|a Basel
|c 2022
|
300 |
|
|
|a 1 electronic resource (210 p.)
|
653 |
|
|
|a measurement device independent
|
653 |
|
|
|a underwater channel
|
653 |
|
|
|a EPR pairs
|
653 |
|
|
|a detection probability
|
653 |
|
|
|a postquantum cryptography (PQC)
|
653 |
|
|
|a discrete variable (DV)-QKD
|
653 |
|
|
|a private equality tests
|
653 |
|
|
|a n/a
|
653 |
|
|
|a algorithm
|
653 |
|
|
|a secret key distillation
|
653 |
|
|
|a pilot randomization
|
653 |
|
|
|a quantum identity authentication
|
653 |
|
|
|a vulnerability
|
653 |
|
|
|a amplification
|
653 |
|
|
|a History of engineering and technology / bicssc
|
653 |
|
|
|a twin-field quantum key distribution
|
653 |
|
|
|a physical layer security
|
653 |
|
|
|a universal composability
|
653 |
|
|
|a conclusive exclusion
|
653 |
|
|
|a Bayesian statistics
|
653 |
|
|
|a reconciliation
|
653 |
|
|
|a quantum network
|
653 |
|
|
|a injection attacks
|
653 |
|
|
|a Technology: general issues / bicssc
|
653 |
|
|
|a continuous variable (CV)-QKD
|
653 |
|
|
|a quantum key distribution (QKD)
|
653 |
|
|
|a discrete phase randomization
|
653 |
|
|
|a geometrical optics restricted eavesdropping
|
653 |
|
|
|a clock synchronization
|
653 |
|
|
|a information disturbance theorem
|
653 |
|
|
|a mean multi-kings' problem
|
653 |
|
|
|a quantum communications
|
653 |
|
|
|a mean-king's problem
|
653 |
|
|
|a zero-photon catalysis
|
653 |
|
|
|a jamming attacks
|
653 |
|
|
|a measurement-device-independent
|
653 |
|
|
|a quantum cryptography
|
653 |
|
|
|a phase-matching
|
653 |
|
|
|a quantum entanglement
|
653 |
|
|
|a secret key generation
|
653 |
|
|
|a oblivious transfer
|
653 |
|
|
|a surface codes
|
653 |
|
|
|a entanglement
|
653 |
|
|
|a intrinsic bit error rate
|
653 |
|
|
|a continuous-variable quantum key distribution
|
653 |
|
|
|a quantum communications networks (QCNs)
|
653 |
|
|
|a single-photon mode
|
653 |
|
|
|a the Bernstein-Vazirani algorithm
|
653 |
|
|
|a post-quantum cryptography
|
653 |
|
|
|a satellite-to-satellite
|
653 |
|
|
|a quantum key distribution
|
653 |
|
|
|a synchronization
|
653 |
|
|
|a quantum information theory
|
653 |
|
|
|a QKD
|
653 |
|
|
|a distillation
|
700 |
1 |
|
|a Djordjevic, Ivan B.
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
028 |
5 |
0 |
|a 10.3390/books978-3-0365-5004-6
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/book/5957
|7 0
|x Verlag
|3 Volltext
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/92081
|z DOAB: description of the publication
|
082 |
0 |
|
|a 900
|
082 |
0 |
|
|a 000
|
082 |
0 |
|
|a 380
|
082 |
0 |
|
|a 600
|
082 |
0 |
|
|a 620
|
520 |
|
|
|a The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled "Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography" was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.
|