Controlling the key by choosing the detection bits in quantum cryptographic protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Cryptographic Key Distribution Protocols

The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several p...

متن کامل

study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour

this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...

Cryptographic Protocols under Quantum Attacks

The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional set...

متن کامل

Key Substitution in the Symbolic Analysis of Cryptographic Protocols

Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. Schemes vulnerable to this attack thus permit an active intruder to claim to be the issuer of a signed message. A digital sign...

متن کامل

a study of the fifth child and ben in the world by doris lessing in the light of julia kristevas psychoanalytic concepts

این مطالعه به بررسی عوامل روانشناختی کریستوادردو رمان دوربس لسینگ،فرزندبنجم و بن دردنیای واقعی می بردازد.موفقیت یا شکست کاراکترهادر تکمیل شکست تتیزی یه کمک بدر وهم از مهم ترین دغدغه محقق می باشد.به بررسی تحلیل روانشناختی تمامی کاراکترها خصوصا بن برداخته و به دنبال نشانه هایی از جامعه شیشه ای کریستوا می باشد.

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2015

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-015-5413-8