12 May 2006 Post-quantum key exchange protocols
Author Affiliations +
Abstract
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiangdong Li, Xiangdong Li, Lin Leung, Lin Leung, Andis Chi-Tung Kwan, Andis Chi-Tung Kwan, Xiaowen Zhang, Xiaowen Zhang, Dammika Kahanda, Dammika Kahanda, Michael Anshel, Michael Anshel, } "Post-quantum key exchange protocols", Proc. SPIE 6244, Quantum Information and Computation IV, 62440N (12 May 2006); doi: 10.1117/12.665685; https://doi.org/10.1117/12.665685
PROCEEDINGS
11 PAGES


SHARE
RELATED CONTENT

Quantum teleportation for keyless cryptography
Proceedings of SPIE (May 21 2015)
A quantum oblivious transfer protocol
Proceedings of SPIE (October 01 2013)
Quantum teleportation and survey technology
Proceedings of SPIE (October 22 2010)
Quantum no-key protocol with inherent identification
Proceedings of SPIE (August 30 2006)

Back to Top