Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Raw Key

Encyclopedia of Information Science and Technology, Second Edition
Two parties agree on a shared binary secret from a sequence of randomly polarized photons.
Published in Chapter:
Quantum Cryptography Protocols for Information Security
Göran Pulkkis (Arcada Polytechnic, Finland) and Kaj J. Grahn (Arcada Polytechnic, Finland)
DOI: 10.4018/978-1-60566-026-4.ch510
Abstract
Quantum cryptography will have a severe impact on information security technology. The objective of this article is to present state-of-the-art and future possibilities of two quantum cryptography protocol types. These protocols are for absolutely secure distribution of symmetric encryption/ decryption keys and for creating secure digital signatures.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR