نتایج جستجو برای: random key pre distribution

تعداد نتایج: 1636984  

Journal: :Quantum Information & Computation 2008
Guilherme Penello Temporão Hugo Zbinden Sebastien Tanzilli Nicolas Gisin Thierry Aellen Marcella Giovannini Jerome Faist Jean Pierre von der Weid

We report on a feasibility study of a free-space Quantum Key Distribution setup operating at a mid-infrared wavelength. Alice sends polarization-coded pseudo-single photons from a Quantum Cascade Laser at 4.6 μm to Bob, who uses a nonlinear crystal and a Silicon Avalanche Photodiode to perform the detection via Sum Frequency Generation. Theoretical predictions, based on a proof-of-principle exp...

2004
Ruizhong Wei Jiang Wu

Wireless sensor networks is composed of a large number of randomly deployed sensor nodes with limited computing ability and memory space. These characteristics gives rise to much challenge to key agreement. General key agreement schemes like KDC, PKI and Diffie-Hellman key exchange schemes are not applicable to the sensor networks. Several key distribution schemes have been proposed specificall...

Journal: :CoRR 2015
You-Qi Nie Leilei Huang Yang Liu Frank Payne Jun Zhang Jian-Wei Pan

Random numbers have a wide range of applications such as encryption, Monte Carlo simulation, statistical analysis, and lottery. The indeterministic nature of quantum mechanics allows us to construct quantum random number generators (QRNGs) whose output cannot be predicted. The generation speed is essential for practical applications, such as high-speed quantum key distribution systems. Here, we...

Journal: :IEEE Transactions on Wireless Communications 2013

Uwe R¨osler,

We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.

2009
Rajgopal Kannan Lydia Ray Arjan Durresi

Key pre-distribution is a well-known technique for ensuring secure communication among sensors deployed in an ad-hoc manner to form a sensor network. Secure paths can be established between any two sensors, where adjacent sensors on the path share a (predistributed) secret key. Several results have been presented recently on random key predistribution schemes [6] and [2]. In this paper, we prop...

1996
Lars R. Knudsen Torben P. Pedersen

At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to en-crypt in such a way that the receiver can be traced by an authority having additional information. This paper shows that the proposed scheme does not have the required properties, by devising three non-speciied protocols misleading the authority. We also discuss how to repair Desmedt's scheme, such that our attacks are n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید