نتایج جستجو برای: distribution key
تعداد نتایج: 1126998 فیلتر نتایج به سال:
In 1997, H. Sakazaki, E. Okamato and M. Mambo [4] proposed an ID-based key distribution system on an elliptic curve over Zn. We will cryptanalyze the scheme and demonstrate that when the hashed ID length is about 160 bits, the scheme is insecure. To be specific, after requesting a small number of keys from the Center, our attack allows a new valid key to be constructed without any further inter...
Decentralized group key management schemes for supporting secure group communication systems have been studied in the two flavors of contributory key agreement and decentralized key distribution. However, the primary focus has been on the former because the latter have been criticized for additional overheads of establishing secure channels and for the possibility of weak keys produced by the g...
Institute of Computer Science, The Hebrew University, Jerusalem, Israel Institute of Theoretical Physics and Astrophysics, University of Gdańsk, Poland Institute for Quantum Information, California Institute of Technology, Pasadena, USA Mathematical Science Research Institute, Berkeley, USA Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge, UK Isaac N...
In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current s...
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis in...
Shihan Sajeed,1,2,* Igor Radchenko,3 Sarah Kaiser,1,4 Jean-Philippe Bourgoin,1,4 Anna Pappa,5 Laurent Monat,6 Matthieu Legré,6 and Vadim Makarov1,4,2 1Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 2Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 3General Physics Institute, Russian Academy of Sciences...
The security of quantum key distribution with sub-Poisson light sources is investigated. It is shown that a quantitative analysis of the security of such sources requires only two measured values, the efficiency and second-order correlation. These two numbers represent figures of merit, which characterize the performance of such light sources. We show that sub-Poisson light sources can offer si...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید