منابع مشابه
Noise Analysis for two Quantum Cryptography Protocols
This paper presents noise analysis for the two-stage and the three-stage quantum cryptographic protocols based on random polarization rotations. The noise model used is that of uniform distribution of error over a certain small range that is associated with each link without regard for the source of the error. The noise in different links is taken to be independent. Advantages of the use of the...
متن کاملFaked states attack and quantum cryptography protocols
Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols[4], [3], [6], [17]. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems[12]. This attack exploits a weakness in th...
متن کاملNOVEL QUBIT QUANTUM CRYPTOGRAPHY PROTOCOLS Quantum Secret Sharing
This report summarises the ongoing work in QuComm on the demonstration of novel quantum communication protocols, in particular multi-party protocols or protocols which use more than 2-states (or more than one qubit). Such new protocols will extend the capabilities of quantum communication by increasing the channel capacity, by making the systems less sensitive to channel noise. Examples of such...
متن کاملVerification of Quantum Cryptography Protocols by Model Checking
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance an...
متن کاملEvent-by-event Simulation of Quantum Cryptography Protocols∗
Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this information. To this end, the sender usually employs some key to encrypt the information to be transmitted, and the receiver applies a decryption algorithm to recover the original information. If the cryptographic system is secure, an eavesdropper can decipher the encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Scientific Journal of Information Security
سال: 2014
ISSN: 2411-071X,2225-5036
DOI: 10.18372/2225-5036.20.6574