all InfoSec news
Quantum key distribution with post-processing driven by physical unclonable functions. (arXiv:2302.07623v1 [quant-ph])
cs.CR updates on arXiv.org arxiv.org
Quantum key-distribution protocols allow two honest distant parties to
establish a common truly random secret key in the presence of powerful
adversaries, provided that the two users share beforehand a short secret key.
This pre-shared secret key is used mainly for authentication purposes in the
post-processing of classical data that have been obtained during the quantum
communication stage, and it prevents a man-in-the-middle attack. The necessity
of a pre-shared key is usually considered as the main drawback of quantum
key-distribution …
adversaries attack authentication communication data distribution functions key man-in-the-middle physical protocols quantum quantum key distribution random secret secret key share stage