Paper
12 May 2006 Post-quantum key exchange protocols
Xiangdong Li, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda, Michael Anshel
Author Affiliations +
Abstract
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xiangdong Li, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda, and Michael Anshel "Post-quantum key exchange protocols", Proc. SPIE 6244, Quantum Information and Computation IV, 62440N (12 May 2006); https://doi.org/10.1117/12.665685
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum computing

Clocks

Quantum clocks

Particles

Satellites

Teleportation

Computer security

RELATED CONTENT


Back to Top