All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Risk assessment approach to estimate security of cryptographic keys in quantum cryptography

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F20%3A10244029" target="_blank" >RIV/61989100:27240/20:10244029 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/20:10244029

  • Result on the web

    <a href="https://link.springer.com/chapter/10.1007/978-3-030-14907-9_12" target="_blank" >https://link.springer.com/chapter/10.1007/978-3-030-14907-9_12</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-030-14907-9_12" target="_blank" >10.1007/978-3-030-14907-9_12</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Risk assessment approach to estimate security of cryptographic keys in quantum cryptography

  • Original language description

    Increased interest in quantum cryptography is observed in recent years. Although this technique is characterized by a very high level of security, there are still challenges of quantum key distribution that should be solved. One of the most important problem remains security mechanisms for the key distillation process which can be effectively controlled by end users. This article presents a new idea for security assessment of cryptographic key based on the risk management in quantum cryptography. This proposal assumes the estimation of risk level using two components: likelihood and impact. The likelihood can be defined by the probability of eavesdropping during the quantum bit estimation. The impact is associated with the effect of key reduction in the all steps of key distillation process. Using this novel approach end users of quantum cryptography will be able to control both efficiency and security level of cryptographic keys. (C) Springer Nature Switzerland AG 2020.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/EF16_027%2F0008463" target="_blank" >EF16_027/0008463: Science without borders</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Lecture Notes in Electrical Engineering. Volume 554

  • ISBN

    978-3-030-14906-2

  • ISSN

    1876-1100

  • e-ISSN

    1876-1119

  • Number of pages

    11

  • Pages from-to

    114-124

  • Publisher name

    Springer

  • Place of publication

    Cham

  • Event location

    Ostrava

  • Event date

    Sep 11, 2018

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article