{"id":268,"date":"2018-01-23T09:12:24","date_gmt":"2018-01-23T09:12:24","guid":{"rendered":"http:\/\/www.quantum-technology.gr\/?p=268"},"modified":"2018-01-23T09:12:24","modified_gmt":"2018-01-23T09:12:24","slug":"continuous-variable-quantum-authentication-of-physical-unclonable-keys-security-against-an-emulation-attack","status":"publish","type":"post","link":"https:\/\/www.quantum-technology.gr\/index.php\/2018\/01\/23\/continuous-variable-quantum-authentication-of-physical-unclonable-keys-security-against-an-emulation-attack\/","title":{"rendered":"Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack"},"content":{"rendered":"<p>A security analysis of the quantum-optical PUK-based authentication protocol presented by GMN in 2017 (see older posts), against an emulation attack. By contrast to non-quantum authentication schemes, it is shown that the scheme under considetaration can be both practical and secure \u00a0[<a href=\"https:\/\/link.aps.org\/doi\/10.1103\/PhysRevA.97.012324\" target=\"_blank\" rel=\"noopener\">link<\/a>].<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security analysis of the quantum-optical PUK-based authentication protocol presented by GMN in 2017 (see older posts), against an emulation attack. By contrast to non-quantum authentication schemes, it is shown that the scheme under considetaration can be both practical and secure \u00a0[link].<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-268","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":1,"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":269,"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/posts\/268\/revisions\/269"}],"wp:attachment":[{"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quantum-technology.gr\/index.php\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}