TY - BOOK ID - 134113617 TI - Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography PY - 2022 PB - Basel MDPI Books DB - UniCat KW - Technology: general issues KW - History of engineering & technology KW - continuous-variable quantum key distribution KW - measurement device independent KW - zero-photon catalysis KW - underwater channel KW - quantum key distribution (QKD) KW - discrete variable (DV)-QKD KW - continuous variable (CV)-QKD KW - postquantum cryptography (PQC) KW - quantum communications networks (QCNs) KW - quantum communications KW - entanglement KW - surface codes KW - quantum cryptography KW - quantum key distribution KW - quantum network KW - measurement-device-independent KW - mean-king’s problem KW - mean multi-kings’ problem KW - information disturbance theorem KW - QKD KW - distillation KW - amplification KW - reconciliation KW - quantum identity authentication KW - private equality tests KW - conclusive exclusion KW - single-photon mode KW - synchronization KW - algorithm KW - detection probability KW - vulnerability KW - twin-field quantum key distribution KW - phase-matching KW - discrete phase randomization KW - intrinsic bit error rate KW - the Bernstein-Vazirani algorithm KW - EPR pairs KW - quantum entanglement KW - quantum information theory KW - geometrical optics restricted eavesdropping KW - secret key distillation KW - satellite-to-satellite KW - physical layer security KW - secret key generation KW - injection attacks KW - jamming attacks KW - pilot randomization KW - clock synchronization KW - Bayesian statistics KW - oblivious transfer KW - post-quantum cryptography KW - universal composability KW - n/a KW - mean-king's problem KW - mean multi-kings' problem UR - https://www.unicat.be/uniCat?func=search&query=sysid:134113617 AB - The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue. ER -