Reprint

Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

Edited by
August 2022
210 pages
  • ISBN978-3-0365-5003-9 (Hardback)
  • ISBN978-3-0365-5004-6 (PDF)

This book is a reprint of the Special Issue Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography that was published in

Chemistry & Materials Science
Computer Science & Mathematics
Physical Sciences
Summary

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes.  So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Format
  • Hardback
License
© by the authors
Keywords
continuous-variable quantum key distribution; measurement device independent; zero-photon catalysis; underwater channel; quantum key distribution (QKD); discrete variable (DV)-QKD; continuous variable (CV)-QKD; postquantum cryptography (PQC); quantum communications networks (QCNs); quantum key distribution (QKD); quantum communications networks (QCNs); quantum communications; entanglement; surface codes; quantum cryptography; quantum key distribution; quantum network; measurement-device-independent; quantum key distribution; mean-king’s problem; mean multi-kings’ problem; information disturbance theorem; QKD; distillation; amplification; reconciliation; quantum identity authentication; private equality tests; conclusive exclusion; quantum key distribution; single-photon mode; synchronization; algorithm; detection probability; vulnerability; twin-field quantum key distribution; phase-matching; discrete phase randomization; intrinsic bit error rate; quantum cryptography; quantum key distribution; the Bernstein-Vazirani algorithm; EPR pairs; quantum entanglement; quantum information theory; geometrical optics restricted eavesdropping; secret key distillation; satellite-to-satellite; physical layer security; secret key generation; injection attacks; jamming attacks; pilot randomization; quantum key distribution (QKD); clock synchronization; Bayesian statistics; oblivious transfer; quantum cryptography; post-quantum cryptography; universal composability; n/a