2018
DOI: 10.1007/978-3-030-03638-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Deniability in Quantum Key Exchange

Abstract: We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., an… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…e proposed protocol also enables efficient traceability in case a vehicle misbehaves. (3) We have also evaluated the performance of our protocol by implementing it on QKD simulator [35]. e results obtained confirm that it performs reasonably regarding information leakage and key length.…”
Section: Introductionmentioning
confidence: 81%
See 1 more Smart Citation
“…e proposed protocol also enables efficient traceability in case a vehicle misbehaves. (3) We have also evaluated the performance of our protocol by implementing it on QKD simulator [35]. e results obtained confirm that it performs reasonably regarding information leakage and key length.…”
Section: Introductionmentioning
confidence: 81%
“…[45], but the proposed work provides unconditional security, which is not guaranteed by any of the other works. In addition, as the proposed protocol utilizes one of the quantum key distribution protocols, namely, BB84 protocol, we have also evaluated the performance parameters of BB84 protocol by performing simulation in QKD simulator [35]. QKD simulator, which is purely written in Python and applies standard libraries such as Scipy, Numpy, Pycrypto, etc., is well-known for returning simulation results by utilizing QKD stack, which includes a quantum channel, shifting, authentication using hashing, error estimation, error correction, and privacy amplification.…”
Section: Performance Evaluation and Comparisonmentioning
confidence: 99%