Security of classical noise-based cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of classical noise-based cryptography

We examine the security of a protocol on cryptographic key distribution proposed by Yuen and Kim (Yuen H P and Kim A M 1998 Phys. Lett. A 241 135). Theoretical and experimental analysis shows that, even if the eavesdropper can receive more photons than the legitimate receiver, secure key distribution is possible as long as the signal-to-noise ratio of the eavesdropper does not exceed eight time...

متن کامل

A classical introduction to cryptography - applications for communications security

The book is aimed at bridging the gap between cryptography and its standard applications. From my point of view, it has achieved its goal. This book presents basic tools of cryptography with applications in communication and information security. This book is a compilation of author’s lecture notes that he used for teaching cryptography to undergraduate students. Though this book is titled like...

متن کامل

Subgroup Security in Pairing-Based Cryptography

Pairings are typically implemented using ordinary pairingfriendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in the multiplicative group of a large finite field. At moderate levels of security, at least two of the three pairing groups are necessarily proper subgroups of a much larger composite-order group, which...

متن کامل

Pairing-Based Cryptography at High Security Levels

In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solution by Boneh and Franklin [7] of the problem of efficient identity-based encryption. At the same time, the security standards for public key cryptosystems are expected to increase, so that in the future they will be cap...

متن کامل

Virtual DNA-Based Cryptography for Enhanced Security

DNA Cryptosystem involves using the principles of random yet structured DNA mechanisms to realise the encryption process. One such cryptographic scheme is proposed in our paper which incorporates the fundamental concept of DNA Hybridization and recombinant DNA technology. We imbibe the principles of restriction enzymes to implement a secure virtual cryptosystem with a two stage encryption schem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Optics B: Quantum and Semiclassical Optics

سال: 2000

ISSN: 1464-4266,1741-3575

DOI: 10.1088/1464-4266/2/6/301