LEADER 04553nam 2200973z- 450 001 9910595075303321 005 20231214133243.0 035 $a(CKB)5680000000080773 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/92081 035 $a(EXLCZ)995680000000080773 100 $a20202209d2022 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPhysical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography 210 $aBasel$cMDPI Books$d2022 215 $a1 electronic resource (210 p.) 311 $a3-0365-5003-8 311 $a3-0365-5004-6 330 $aThe growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled ?Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography? was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue. 606 $aTechnology: general issues$2bicssc 606 $aHistory of engineering & technology$2bicssc 610 $acontinuous-variable quantum key distribution 610 $ameasurement device independent 610 $azero-photon catalysis 610 $aunderwater channel 610 $aquantum key distribution (QKD) 610 $adiscrete variable (DV)-QKD 610 $acontinuous variable (CV)-QKD 610 $apostquantum cryptography (PQC) 610 $aquantum communications networks (QCNs) 610 $aquantum communications 610 $aentanglement 610 $asurface codes 610 $aquantum cryptography 610 $aquantum key distribution 610 $aquantum network 610 $ameasurement-device-independent 610 $amean-king's problem 610 $amean multi-kings' problem 610 $ainformation disturbance theorem 610 $aQKD 610 $adistillation 610 $aamplification 610 $areconciliation 610 $aquantum identity authentication 610 $aprivate equality tests 610 $aconclusive exclusion 610 $asingle-photon mode 610 $asynchronization 610 $aalgorithm 610 $adetection probability 610 $avulnerability 610 $atwin-field quantum key distribution 610 $aphase-matching 610 $adiscrete phase randomization 610 $aintrinsic bit error rate 610 $athe Bernstein-Vazirani algorithm 610 $aEPR pairs 610 $aquantum entanglement 610 $aquantum information theory 610 $ageometrical optics restricted eavesdropping 610 $asecret key distillation 610 $asatellite-to-satellite 610 $aphysical layer security 610 $asecret key generation 610 $ainjection attacks 610 $ajamming attacks 610 $apilot randomization 610 $aclock synchronization 610 $aBayesian statistics 610 $aoblivious transfer 610 $apost-quantum cryptography 610 $auniversal composability 615 7$aTechnology: general issues 615 7$aHistory of engineering & technology 700 $aDjordjevic$b Ivan B$4edt$0763019 702 $aDjordjevic$b Ivan B$4oth 906 $aBOOK 912 $a9910595075303321 996 $aPhysical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography$93038585 997 $aUNINA