Quantum Key Distribution in the Classical Authenticated Key Exchange Framework (extended abstract)
暂无分享,去创建一个
[1] Jörn Müller-Quade,et al. Long-Term Security and Universal Composability , 2007, Journal of Cryptology.
[2] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[3] Debbie W. Leung,et al. The Universal Composable Security of Quantum Key Distribution , 2004, TCC.
[4] Michele Mosca,et al. A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys , 2011, PQCrypto.
[5] Kristin E. Lauter,et al. Stronger Security of Authenticated Key Exchange , 2006, ProvSec.
[6] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[7] Cas J. F. Cremers. Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK , 2011, ASIACCS '11.
[8] Hitoshi Inamori,et al. Security of Practical Time-Reversed EPR Quantum Key Distribution , 2002, Algorithmica.
[9] Kenneth G. Paterson,et al. Quantum cryptography: a practical information security perspective , 2004, IACR Cryptol. ePrint Arch..
[10] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.
[11] Ian Goldberg,et al. Anonymity and one-way authentication in key exchange protocols , 2012, Designs, Codes and Cryptography.
[12] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[13] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[14] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[15] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[16] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[17] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[18] Alfred Menezes,et al. An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..
[19] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[20] Douglas Stebila,et al. The Case for Quantum Key Distribution , 2009, QuantumComm.
[21] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[22] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[23] Biham,et al. Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[24] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[25] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.