ALLEAUME, R., C. BRANCIARD, Jan BOUDA, T. DEBUISSCHERT, M. DIANATI, N. GISIN, M. GODFREY, P. GRANGIER, T. LANGER, N. LUTKENHAUS, C. MONYK, P. PAINCHAULT, Momtchil PEEV, A. POPPE, T. PORNIN, J. RARITY, R. RENNER, G. RIBORDY, M. RIGUIDEL, L. SALVAIL, A. SHIELDS, H. WEINFURTER a A. ZEILINGER. Using quantum key distribution for cryptographic purposes: A survey. Theoretical Computer Science. Amsterdam: Elsevier, 2014, roč. 560, č. 1, s. 62-81. ISSN 0304-3975. Dostupné z: https://dx.doi.org/10.1016/j.tcs.2014.09.018.
Další formáty:   BibTeX LaTeX RIS
Základní údaje
Originální název Using quantum key distribution for cryptographic purposes: A survey
Autoři ALLEAUME, R. (250 Francie), C. BRANCIARD (250 Francie), Jan BOUDA (203 Česká republika, domácí), T. DEBUISSCHERT (250 Francie), M. DIANATI (250 Francie), N. GISIN (250 Francie), M. GODFREY (250 Francie), P. GRANGIER (250 Francie), T. LANGER (250 Francie), N. LUTKENHAUS (250 Francie), C. MONYK (250 Francie), P. PAINCHAULT (250 Francie), Momtchil PEEV (40 Rakousko), A. POPPE (250 Francie), T. PORNIN (250 Francie), J. RARITY (250 Francie), R. RENNER (250 Francie), G. RIBORDY (250 Francie), M. RIGUIDEL (250 Francie), L. SALVAIL (250 Francie), A. SHIELDS (250 Francie), H. WEINFURTER (250 Francie) a A. ZEILINGER (250 Francie).
Vydání Theoretical Computer Science, Amsterdam, Elsevier, 2014, 0304-3975.
Další údaje
Originální jazyk angličtina
Typ výsledku Článek v odborném periodiku
Obor 10201 Computer sciences, information science, bioinformatics
Stát vydavatele Švýcarsko
Utajení není předmětem státního či obchodního tajemství
Impakt faktor Impact factor: 0.657
Kód RIV RIV/00216224:14330/14:00087425
Organizační jednotka Fakulta informatiky
Doi http://dx.doi.org/10.1016/j.tcs.2014.09.018
UT WoS 000347600900007
Klíčová slova anglicky Key distribution; Quantum cryptography
Změnil Změnil: RNDr. Pavel Šmerk, Ph.D., učo 3880. Změněno: 6. 5. 2016 06:50.
Anotace
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using Q(D as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research. (C) 2014 Elsevier B.V. All rights reserved.
VytisknoutZobrazeno: 28. 4. 2024 13:21