Paper
12 May 2006 Post-quantum key exchange protocols
Xiangdong Li, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda, Michael Anshel
Author Affiliations +
Abstract
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiangdong Li, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda, and Michael Anshel "Post-quantum key exchange protocols", Proc. SPIE 6244, Quantum Information and Computation IV, 62440N (12 May 2006); https://doi.org/10.1117/12.665685
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum computing

Clocks

Quantum clocks

Particles

Satellites

Teleportation

Computer security

RELATED CONTENT

Quantum teleportation for keyless cryptography
Proceedings of SPIE (May 21 2015)
Quantum teleportation and survey technology
Proceedings of SPIE (October 22 2010)
Quantum no-key protocol with inherent identification
Proceedings of SPIE (August 30 2006)
Quantum noise and probabilistic teleportation
Proceedings of SPIE (May 16 2003)

Back to Top