منابع مشابه
Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملScalable Multicast Key Distribution
groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a \working draft" or \work in progress." Abstract Multicasting is becoming an...
متن کاملQuantum Authenticated Key Distribution
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...
متن کاملdense key distribution ”
In his Comment [1], Wójcik proposes two simple schemes for performing eavesdropping attacks to the Quantum Dense Key Distribution protocol (QDKD) in Ref. [2]. These schemes enable Eve to achieve a larger mutual information than Alice’s and Bob’s one, but maintaining inviolated the security condition (Eq. (6) in Ref. [2]). Eve’s attack in Wójcik’s schemes relies on the possibility of subtraction...
متن کاملQuantum Key Distribution - QKD
This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach thro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Photonics
سال: 2013
ISSN: 1749-4885,1749-4893
DOI: 10.1038/nphoton.2013.17