LEADER 04578nam 2200997z- 450 001 9910595075303321 005 20220916 035 $a(CKB)5680000000080773 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/92081 035 $a(oapen)doab92081 035 $a(EXLCZ)995680000000080773 100 $a20202209d2022 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aPhysical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography 210 $aBasel$d2022 215 $a1 online resource (210 p.) 311 08$a3-0365-5003-8 311 08$a3-0365-5004-6 330 $aThe growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled "Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography" was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue. 606 $aHistory of engineering and technology$2bicssc 606 $aTechnology: general issues$2bicssc 610 $aalgorithm 610 $aamplification 610 $aBayesian statistics 610 $aclock synchronization 610 $aconclusive exclusion 610 $acontinuous variable (CV)-QKD 610 $acontinuous-variable quantum key distribution 610 $adetection probability 610 $adiscrete phase randomization 610 $adiscrete variable (DV)-QKD 610 $adistillation 610 $aentanglement 610 $aEPR pairs 610 $ageometrical optics restricted eavesdropping 610 $ainformation disturbance theorem 610 $ainjection attacks 610 $aintrinsic bit error rate 610 $ajamming attacks 610 $amean multi-kings' problem 610 $amean-king's problem 610 $ameasurement device independent 610 $ameasurement-device-independent 610 $an/a 610 $aoblivious transfer 610 $aphase-matching 610 $aphysical layer security 610 $apilot randomization 610 $apost-quantum cryptography 610 $apostquantum cryptography (PQC) 610 $aprivate equality tests 610 $aQKD 610 $aquantum communications 610 $aquantum communications networks (QCNs) 610 $aquantum cryptography 610 $aquantum entanglement 610 $aquantum identity authentication 610 $aquantum information theory 610 $aquantum key distribution 610 $aquantum key distribution (QKD) 610 $aquantum network 610 $areconciliation 610 $asatellite-to-satellite 610 $asecret key distillation 610 $asecret key generation 610 $asingle-photon mode 610 $asurface codes 610 $asynchronization 610 $athe Bernstein-Vazirani algorithm 610 $atwin-field quantum key distribution 610 $aunderwater channel 610 $auniversal composability 610 $avulnerability 610 $azero-photon catalysis 615 7$aHistory of engineering and technology 615 7$aTechnology: general issues 700 $aDjordjevic$b Ivan B$4edt$0763019 702 $aDjordjevic$b Ivan B$4oth 906 $aBOOK 912 $a9910595075303321 996 $aPhysical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography$93038585 997 $aUNINA