04553nam 2200973z- 450 991059507530332120231214133243.0(CKB)5680000000080773(oapen)https://directory.doabooks.org/handle/20.500.12854/92081(EXLCZ)99568000000008077320202209d2022 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierPhysical-Layer Security, Quantum Key Distribution and Post-quantum CryptographyBaselMDPI Books20221 electronic resource (210 p.)3-0365-5003-8 3-0365-5004-6 The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.Technology: general issuesbicsscHistory of engineering & technologybicssccontinuous-variable quantum key distributionmeasurement device independentzero-photon catalysisunderwater channelquantum key distribution (QKD)discrete variable (DV)-QKDcontinuous variable (CV)-QKDpostquantum cryptography (PQC)quantum communications networks (QCNs)quantum communicationsentanglementsurface codesquantum cryptographyquantum key distributionquantum networkmeasurement-device-independentmean-king's problemmean multi-kings' probleminformation disturbance theoremQKDdistillationamplificationreconciliationquantum identity authenticationprivate equality testsconclusive exclusionsingle-photon modesynchronizationalgorithmdetection probabilityvulnerabilitytwin-field quantum key distributionphase-matchingdiscrete phase randomizationintrinsic bit error ratethe Bernstein-Vazirani algorithmEPR pairsquantum entanglementquantum information theorygeometrical optics restricted eavesdroppingsecret key distillationsatellite-to-satellitephysical layer securitysecret key generationinjection attacksjamming attackspilot randomizationclock synchronizationBayesian statisticsoblivious transferpost-quantum cryptographyuniversal composabilityTechnology: general issuesHistory of engineering & technologyDjordjevic Ivan Bedt763019Djordjevic Ivan BothBOOK9910595075303321Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography3038585UNINA