Dispelling myths on superposition attacks: formal security model and attack analyses
With the emergence of quantum communication, it is of folkloric belief that the security of classical cryptographic protocols is automatically broken if the Adversary is allowed to perform superposition queries and the honest players forced to perform actions coherently on quantum states. Another wi...
Saved in:
| Published in: | Designs, codes, and cryptography Vol. 90; no. 4; pp. 881 - 920 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.04.2022
Springer Nature B.V Springer Verlag |
| Subjects: | |
| ISSN: | 0925-1022, 1573-7586 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!