Convenient key distribution

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

Scalable Multicast Key Distribution

groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a \working draft" or \work in progress." Abstract Multicasting is becoming an...

متن کامل

Quantum Authenticated Key Distribution

Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...

متن کامل

dense key distribution ”

In his Comment [1], Wójcik proposes two simple schemes for performing eavesdropping attacks to the Quantum Dense Key Distribution protocol (QDKD) in Ref. [2]. These schemes enable Eve to achieve a larger mutual information than Alice’s and Bob’s one, but maintaining inviolated the security condition (Eq. (6) in Ref. [2]). Eve’s attack in Wójcik’s schemes relies on the possibility of subtraction...

متن کامل

Quantum Key Distribution - QKD

This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach thro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Photonics

سال: 2013

ISSN: 1749-4885,1749-4893

DOI: 10.1038/nphoton.2013.17