12 May 2006 Post-quantum key exchange protocols
Author Affiliations +
Abstract
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiangdong Li, Xiangdong Li, Lin Leung, Lin Leung, Andis Chi-Tung Kwan, Andis Chi-Tung Kwan, Xiaowen Zhang, Xiaowen Zhang, Dammika Kahanda, Dammika Kahanda, Michael Anshel, Michael Anshel, "Post-quantum key exchange protocols", Proc. SPIE 6244, Quantum Information and Computation IV, 62440N (12 May 2006); doi: 10.1117/12.665685; https://doi.org/10.1117/12.665685
PROCEEDINGS
11 PAGES


SHARE
RELATED CONTENT


Back to Top