Quantum Key Distribution with Post-Processing Driven by Physical Unclonable Functions

Na minha lista:
Detalhes bibliográficos
Publicado no:Applied Sciences vol. 14, no. 1 (2024), p. 464
Autor principal: Nikolopoulos, Georgios M
Outros Autores: Fischlin, Marc
Publicado em:
MDPI AG
Assuntos:
Acesso em linha:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!

MARC

LEADER 00000nab a2200000uu 4500
001 2912614514
003 UK-CbPIL
022 |a 2076-3417 
024 7 |a 10.3390/app14010464  |2 doi 
035 |a 2912614514 
045 2 |b d20240101  |b d20241231 
084 |a 231338  |2 nlm 
100 1 |a Nikolopoulos, Georgios M  |u Institute of Electronic Structure and Laser, Foundation for Research and Technology-Hellas (FORTH), GR-70013 Heraklion, Greece; Institut für Angewandte Physik, Technische Universität Darmstadt, D-64289 Darmstadt, Germany 
245 1 |a Quantum Key Distribution with Post-Processing Driven by Physical Unclonable Functions 
260 |b MDPI AG  |c 2024 
513 |a Journal Article 
520 3 |a Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used mainly for authentication purposes in the post-processing of classical data that have been obtained during the quantum communication stage, and it prevents a man-in-the-middle attack. The necessity of a pre-shared key is usually considered to be the main drawback of quantum key distribution protocols, and it becomes even stronger for large networks involving more than two users. Here, we discuss the conditions under which physical unclonable functions can be integrated in currently available quantum key distribution systems in order to facilitate the generation and the distribution of the necessary pre-shared key with the smallest possible cost in the security of the systems. Moreover, the integration of physical unclonable functions in quantum key distribution networks allows for real-time authentication of the devices that are connected to the network. 
653 |a Mathematical functions 
653 |a Protocol 
653 |a Reconciliation 
700 1 |a Fischlin, Marc  |u Cryptoplexity, Technische Universität Darmstadt, D-64289 Darmstadt, Germany; <email>marc.fischlin@tu-darmstadt.de</email> 
773 0 |t Applied Sciences  |g vol. 14, no. 1 (2024), p. 464 
786 0 |d ProQuest  |t Publicly Available Content Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2912614514/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/2912614514/fulltextwithgraphics/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/2912614514/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch