Next Article in Journal
A Taxonomy of Blockchain Consensus Methods
Previous Article in Journal
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
Open AccessArticle

Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources

1
Institute of Electronic Structure and Laser, FORTH, P.O. Box 1385, GR-70013 Heraklion, Greece
2
Institut für Angewandte Physik, Technische Universität Darmstadt, D-64289 Darmstadt, Germany
3
Cryptoplexity, Technische Universität Darmstadt, D-64289 Darmstadt, Germany
*
Author to whom correspondence should be addressed.
Received: 26 October 2020 / Accepted: 10 November 2020 / Published: 13 November 2020
In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag. We address the question of whether quantum resources can offer any advantage over classical unconditionally secure message authentication codes. It is shown that a broad class of symmetric prepare-and-measure quantum message-authentication schemes cannot do better than their classical counterparts. View Full-Text
Keywords: quantum cryptography; data origin authentication; data integrity; message authentication quantum cryptography; data origin authentication; data integrity; message authentication
MDPI and ACS Style

Nikolopoulos, G.M.; Fischlin, M. Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources. Cryptography 2020, 4, 31. https://0-doi-org.brum.beds.ac.uk/10.3390/cryptography4040031

AMA Style

Nikolopoulos GM, Fischlin M. Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources. Cryptography. 2020; 4(4):31. https://0-doi-org.brum.beds.ac.uk/10.3390/cryptography4040031

Chicago/Turabian Style

Nikolopoulos, Georgios M.; Fischlin, Marc. 2020. "Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources" Cryptography 4, no. 4: 31. https://0-doi-org.brum.beds.ac.uk/10.3390/cryptography4040031

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop