Write
262
edits
No edit summary |
|||
Line 5: | Line 5: | ||
[[Category: Two Party Protocols]] [[Category: Quantum Enhanced Classical Functionality]] [[Category:Specific Task]] | [[Category: Two Party Protocols]] [[Category: Quantum Enhanced Classical Functionality]] [[Category:Specific Task]] | ||
== Use Cases == | |||
* Can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc. | |||
* If secure key rate are sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. One-time pad together with the authentication scheme presented in [[Quantum Key Distribution #References|[1] ]]. | |||
==Protocols== | ==Protocols== | ||
Line 25: | Line 29: | ||
==Further Information== | ==Further Information== | ||
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[ | The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[3] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | ||
==References== | ==References== | ||
#[https://doi.org/10.1007/3-540-48329-2_30 Codes for Interactive Authentication] | |||
#[https://arxiv.org/abs/1409.3525 PR (2014)] discusses security of various QKD schemes composed in other cryptographic protocols. | #[https://arxiv.org/abs/1409.3525 PR (2014)] discusses security of various QKD schemes composed in other cryptographic protocols. | ||
#[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.110.010503 BCK (2013)] Analyses device independent QKD | #[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.110.010503 BCK (2013)] Analyses device independent QKD |