AffiliationCollege of Engineering, University of Arizona
Information theoretic security
Quantum key distribution (QKD)
MetadataShow full item record
CitationDjordjevic, I. B. (2021). QKD-Enhanced Cybersecurity Protocols. IEEE Photonics Journal, 13(2), 1-8.
JournalIEEE Photonics Journal
RightsCopyright © The Author(s). This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
Collection InformationThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at email@example.com.
AbstractSecurity of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography (PQC) is proposed as an alternative to QKD. However, the PQC protocols are based on conjecture that there are no polynomial time algorithms to break the PQC protocols. To overcome key challenges of both post-quantum cryptography and QKD, we propose to use the QKD only in initialization stage to set-up corresponding cybersecurity protocols. The proposed concept is applied to both computational security and PQC protocols. The proposed QKD-enhanced cybersecurity protocols are tolerant to attacks initiated by quantum computers. CCBYNCND
NoteOpen access journal
VersionFinal published version
Except where otherwise noted, this item's license is described as Copyright © The Author(s). This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.