نتایج جستجو برای: distribution key

تعداد نتایج: 1126998  

2010
Minghua Qu Doug Stinson Scott Vanstone

In 1997, H. Sakazaki, E. Okamato and M. Mambo [4] proposed an ID-based key distribution system on an elliptic curve over Zn. We will cryptanalyze the scheme and demonstrate that when the hashed ID length is about 160 bits, the scheme is insecure. To be specific, after requesting a small number of keys from the Center, our attack allows a new valid key to be constructed without any further inter...

2007
Rakesh Bobba Himanshu Khurana

Decentralized group key management schemes for supporting secure group communication systems have been studied in the two flavors of contributory key agreement and decentralized key distribution. However, the primary focus has been on the former because the latter have been criticized for additional overheads of establishing secure channels and for the possibility of weak keys produced by the g...

2005
Michael Ben-Or Michal Horodecki Debbie W. Leung Dominic Mayers Jonathan Oppenheim

Institute of Computer Science, The Hebrew University, Jerusalem, Israel Institute of Theoretical Physics and Astrophysics, University of Gdańsk, Poland Institute for Quantum Information, California Institute of Technology, Pasadena, USA Mathematical Science Research Institute, Berkeley, USA Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge, UK Isaac N...

2010
Oleksandr Korchenko Yevhen Vasiliu Sergiy Gnatyuk

In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...

2004
H. J. Hupkes

We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis in...

Journal: :CoRR 2014
Shihan Sajeed Igor Radchenko Sarah Kaiser Jean-Philippe Bourgoin Anna Pappa Laurent Monat Matthieu Legre Vadim Makarov

Shihan Sajeed,1,2,* Igor Radchenko,3 Sarah Kaiser,1,4 Jean-Philippe Bourgoin,1,4 Anna Pappa,5 Laurent Monat,6 Matthieu Legré,6 and Vadim Makarov1,4,2 1Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 2Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 3General Physics Institute, Russian Academy of Sciences...

2016
Guang-Zhao Tang Shi-Hai Sun Feihu Xu Huan Chen Chun-Yan Li Lin-Mei Liang

2002
Edo Waks Charles Santori Yoshihisa Yamamoto

The security of quantum key distribution with sub-Poisson light sources is investigated. It is shown that a quantitative analysis of the security of such sources requires only two measured values, the efficiency and second-order correlation. These two numbers represent figures of merit, which characterize the performance of such light sources. We show that sub-Poisson light sources can offer si...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید