用户名: 密码: 验证码:
Key Agreement Against Quantum Adversaries.
详细信息   
  • 作者:Kalach ; Kassem.
  • 学历:Doctor
  • 年:2013
  • 毕业院校:Universite de Montreal
  • Department:Faculte des arts et des sciences.
  • ISBN:9780494985700
  • CBH:NR98570
  • Country:Canada
  • 语种:English
  • FileSize:830846
  • Pages:133
文摘
Key agreement is a cryptographic scenario between two legitimate parties,who need to establish a common secret key over a public authenticated channel,and an eavesdropper who intercepts all their messages in order to learn the secret. We consider query complexity in which we count only the number of evaluations queries) of a given black-box function,and classical communication channels. Ralph Merkle provided the first unclassified scheme for secure communications over insecure channels. When legitimate parties are willing to ask ON) queries for some parameter N,any classical eavesdropper needs ON2) queries before being able to learn their secret,which is is optimal. However,a quantum eavesdropper can break this scheme in O N) queries. Furthermore,it was conjectured that any scheme,in which legitimate parties are classical,could be broken in O N) quantum queries. In this thesis,we introduce protocols a la Merkle that fall into two categories. When legitimate parties are restricted to use classical computers,we offer the first secure classical scheme. It requires ON 13/12) queries of a quantum eavesdropper to learn the secret. We give another protocol having security of O N7/6) queries. Furthermore,for any k ≥ 2,we introduce a classical protocol in which legitimate parties establish a secret in ON) queries while the optimal quantum eavesdropping strategy requires theta N12+kk+1 ) queries,approaching thetaN3/2) when k increases. When legitimate parties are provided with quantum computers,we present two quantum protocols improving on the best known scheme before this work. Furthermore,for any k ≥ 2,we give a quantum protocol in which legitimate parties establish a secret in O N) queries while the optimal quantum eavesdropping strategy requires theta N1+kk+1 ) queries,approaching thetaN2) when k increases.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700