Please use this identifier to cite or link to this item: https://doi.org/10.1007/978-3-319-04268-8-8
DC FieldValue
dc.titleInsider-proof encryption with applications for quantum key distribution
dc.contributor.authorMcKague, M.
dc.contributor.authorSheridan, L.
dc.date.accessioned2014-12-12T08:03:27Z
dc.date.available2014-12-12T08:03:27Z
dc.date.issued2014
dc.identifier.citationMcKague, M., Sheridan, L. (2014). Insider-proof encryption with applications for quantum key distribution. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8317 LNCS : 122-141. ScholarBank@NUS Repository. https://doi.org/10.1007/978-3-319-04268-8-8
dc.identifier.isbn9783319042671
dc.identifier.issn16113349
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/117254
dc.description.abstractWe introduce insider-proof private channels which are private channels that additionally allow for security even when the key is correlated with the message. This prevents an insider, who has access to secret keys and the capability of choosing messages to be sent on the channel, from signalling to someone who can read the ciphertexts. We give a construction for approximately insider-proof private channels using 2-universal hash functions. Quantum key distribution (QKD) offers the promise of information-theoretically secure communication, provided a number of assumptions are met. Ideally, the number of these assumptions required in a protocol should be reduced to a minimum. This is the motivation behind device independent QKD (DIQKD) protocols which use an adversarial model for the quantum devices. However, a previous report [3] pointed out that current protocols for DIQKD can leak key to an outside adversary when devices are used repeatedly. We show how to use the insider-proof private channel to allow DIQKD protocols to reuse devices any desired number of times without leaking information. © 2014 Springer International Publishing Switzerland.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-319-04268-8-8
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentCENTRE FOR QUANTUM TECHNOLOGIES
dc.description.doi10.1007/978-3-319-04268-8-8
dc.description.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.description.volume8317 LNCS
dc.description.page122-141
dc.identifier.isiut000341118800008
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.