Share Email Print
cover

Proceedings Paper

Post-quantum key exchange protocols
Author(s): Xiangdong Li; Lin Leung; Andis Chi-Tung Kwan; Xiaowen Zhang; Dammika Kahanda; Michael Anshel
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.

Paper Details

Date Published: 12 May 2006
PDF: 11 pages
Proc. SPIE 6244, Quantum Information and Computation IV, 62440N (12 May 2006); doi: 10.1117/12.665685
Show Author Affiliations
Xiangdong Li, City Univ. of New York (United States)
Lin Leung, City Univ. of New York (United States)
Andis Chi-Tung Kwan, City Univ. of New York (United States)
Xiaowen Zhang, City Univ. of New York (United States)
Dammika Kahanda, City Univ. of New York (United States)
Michael Anshel, City Univ. of New York (United States)


Published in SPIE Proceedings Vol. 6244:
Quantum Information and Computation IV
Eric J. Donkor; Andrew R. Pirich; Howard E. Brandt, Editor(s)

© SPIE. Terms of Use
Back to Top