Stacks of quantum cryptography protocols

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Noise Analysis for two Quantum Cryptography Protocols

This paper presents noise analysis for the two-stage and the three-stage quantum cryptographic protocols based on random polarization rotations. The noise model used is that of uniform distribution of error over a certain small range that is associated with each link without regard for the source of the error. The noise in different links is taken to be independent. Advantages of the use of the...

متن کامل

Faked states attack and quantum cryptography protocols

Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols[4], [3], [6], [17]. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems[12]. This attack exploits a weakness in th...

متن کامل

NOVEL QUBIT QUANTUM CRYPTOGRAPHY PROTOCOLS Quantum Secret Sharing

This report summarises the ongoing work in QuComm on the demonstration of novel quantum communication protocols, in particular multi-party protocols or protocols which use more than 2-states (or more than one qubit). Such new protocols will extend the capabilities of quantum communication by increasing the channel capacity, by making the systems less sensitive to channel noise. Examples of such...

متن کامل

Verification of Quantum Cryptography Protocols by Model Checking

Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance an...

متن کامل

Event-by-event Simulation of Quantum Cryptography Protocols∗

Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this information. To this end, the sender usually employs some key to encrypt the information to be transmitted, and the receiver applies a decryption algorithm to recover the original information. If the cryptographic system is secure, an eavesdropper can decipher the encr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ukrainian Scientific Journal of Information Security

سال: 2014

ISSN: 2411-071X,2225-5036

DOI: 10.18372/2225-5036.20.6574