Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-319-04268-8-8
DC Field | Value | |
---|---|---|
dc.title | Insider-proof encryption with applications for quantum key distribution | |
dc.contributor.author | McKague, M. | |
dc.contributor.author | Sheridan, L. | |
dc.date.accessioned | 2014-12-12T08:03:27Z | |
dc.date.available | 2014-12-12T08:03:27Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | McKague, M., Sheridan, L. (2014). Insider-proof encryption with applications for quantum key distribution. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8317 LNCS : 122-141. ScholarBank@NUS Repository. https://doi.org/10.1007/978-3-319-04268-8-8 | |
dc.identifier.isbn | 9783319042671 | |
dc.identifier.issn | 16113349 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/117254 | |
dc.description.abstract | We introduce insider-proof private channels which are private channels that additionally allow for security even when the key is correlated with the message. This prevents an insider, who has access to secret keys and the capability of choosing messages to be sent on the channel, from signalling to someone who can read the ciphertexts. We give a construction for approximately insider-proof private channels using 2-universal hash functions. Quantum key distribution (QKD) offers the promise of information-theoretically secure communication, provided a number of assumptions are met. Ideally, the number of these assumptions required in a protocol should be reduced to a minimum. This is the motivation behind device independent QKD (DIQKD) protocols which use an adversarial model for the quantum devices. However, a previous report [3] pointed out that current protocols for DIQKD can leak key to an outside adversary when devices are used repeatedly. We show how to use the insider-proof private channel to allow DIQKD protocols to reuse devices any desired number of times without leaking information. © 2014 Springer International Publishing Switzerland. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-319-04268-8-8 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | CENTRE FOR QUANTUM TECHNOLOGIES | |
dc.description.doi | 10.1007/978-3-319-04268-8-8 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 8317 LNCS | |
dc.description.page | 122-141 | |
dc.identifier.isiut | 000341118800008 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.