2022
DOI: 10.3390/e24070935
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography

Abstract: The growth of data-driven technologies, 5G, and the Internet pose enormous pressure on underlying information infrastructure [...]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…In light of these concerns, the integration of quantumbased technologies, particularly Quantum Communication (QC) and Quantum Cryptography (QCrypt), is presented as a promising avenue for addressing these security challenges (Wang et al, 2020). QC offers unconditional security, as eavesdropping attempts are detectable, making it a valuable asset in safeguarding data transmission (Ngobeni et al, 2020;Djordjevic, 2022). However, as quantum-assisted crypto analysers pose a new threat, the security community must focus on devising post-quantum techniques and standardized security protocols (Suomalainen et al, 2018).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In light of these concerns, the integration of quantumbased technologies, particularly Quantum Communication (QC) and Quantum Cryptography (QCrypt), is presented as a promising avenue for addressing these security challenges (Wang et al, 2020). QC offers unconditional security, as eavesdropping attempts are detectable, making it a valuable asset in safeguarding data transmission (Ngobeni et al, 2020;Djordjevic, 2022). However, as quantum-assisted crypto analysers pose a new threat, the security community must focus on devising post-quantum techniques and standardized security protocols (Suomalainen et al, 2018).…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, outlines that a significant portion of IoT applications are expected to run on NB-IoT deployment mode by the end of 2025. However, enhanced usecases introduce security challenges that traditional cryptographic solutions cannot effectively address due to stringent latency requirements (Djordjevic, 2022;Dutta, 2022). The abuse of telecommunications infrastructure by surveillance spyware further exacerbates the challenges faced by IRN signalling traffic (Holtrup et al, 2021).…”
Section: Introductionmentioning
confidence: 99%