Security of classical noise-based cryptography
نویسندگان
چکیده
منابع مشابه
Security of classical noise-based cryptography
We examine the security of a protocol on cryptographic key distribution proposed by Yuen and Kim (Yuen H P and Kim A M 1998 Phys. Lett. A 241 135). Theoretical and experimental analysis shows that, even if the eavesdropper can receive more photons than the legitimate receiver, secure key distribution is possible as long as the signal-to-noise ratio of the eavesdropper does not exceed eight time...
متن کاملA classical introduction to cryptography - applications for communications security
The book is aimed at bridging the gap between cryptography and its standard applications. From my point of view, it has achieved its goal. This book presents basic tools of cryptography with applications in communication and information security. This book is a compilation of author’s lecture notes that he used for teaching cryptography to undergraduate students. Though this book is titled like...
متن کاملSubgroup Security in Pairing-Based Cryptography
Pairings are typically implemented using ordinary pairingfriendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in the multiplicative group of a large finite field. At moderate levels of security, at least two of the three pairing groups are necessarily proper subgroups of a much larger composite-order group, which...
متن کاملPairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solution by Boneh and Franklin [7] of the problem of efficient identity-based encryption. At the same time, the security standards for public key cryptosystems are expected to increase, so that in the future they will be cap...
متن کاملVirtual DNA-Based Cryptography for Enhanced Security
DNA Cryptosystem involves using the principles of random yet structured DNA mechanisms to realise the encryption process. One such cryptographic scheme is proposed in our paper which incorporates the fundamental concept of DNA Hybridization and recombinant DNA technology. We imbibe the principles of restriction enzymes to implement a secure virtual cryptosystem with a two stage encryption schem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Optics B: Quantum and Semiclassical Optics
سال: 2000
ISSN: 1464-4266,1741-3575
DOI: 10.1088/1464-4266/2/6/301