Abstract
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography (PQC) is proposed as an alternative to QKD. However, the PQC protocols are based on conjecture that there are no polynomial time algorithms to break the PQC protocols. To overcome key challenges of both post-quantum cryptography and QKD, we propose to use the QKD only in initialization stage to set-up corresponding cybersecurity protocols. The proposed concept is applied to both computational security and PQC protocols. The proposed QKD-enhanced cybersecurity protocols are tolerant to attacks initiated by quantum computers.
| Original language | English (US) |
|---|---|
| Article number | 9390172 |
| Journal | IEEE Photonics Journal |
| Volume | 13 |
| Issue number | 2 |
| DOIs | |
| State | Published - Apr 2021 |
Keywords
- Physical-layer security
- computational security
- information theoretic security
- post-quantum cryptography
- quantum key distribution (QKD)
ASJC Scopus subject areas
- Atomic and Molecular Physics, and Optics
- Electrical and Electronic Engineering
Fingerprint
Dive into the research topics of 'QKD-Enhanced Cybersecurity Protocols'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS