Feb. 16, 2023, 2:10 a.m. | Georgios M. Nikolopoulos, Marc Fischlin

cs.CR updates on arXiv.org arxiv.org

Quantum key-distribution protocols allow two honest distant parties to
establish a common truly random secret key in the presence of powerful
adversaries, provided that the two users share beforehand a short secret key.
This pre-shared secret key is used mainly for authentication purposes in the
post-processing of classical data that have been obtained during the quantum
communication stage, and it prevents a man-in-the-middle attack. The necessity
of a pre-shared key is usually considered as the main drawback of quantum
key-distribution …

adversaries attack authentication communication data distribution functions key man-in-the-middle physical protocols quantum quantum key distribution random secret secret key share stage

Sr. Staff Security Engineer

@ Databricks | San Francisco, California

Security Engineer

@ Nomi Health | Austin, Texas

Senior Principal Consultant, Security Architecture

@ 6point6 | Manchester, United Kingdom

Cyber Policy Advisor

@ IntelliBridge | McLean, VA, McLean, VA, US

TW Full Stack Software Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Cyber Software Engineer

@ Peraton | Annapolis Junction, MD, United States