نتایج جستجو برای: random key pre distribution
تعداد نتایج: 1636984 فیلتر نتایج به سال:
We report on a feasibility study of a free-space Quantum Key Distribution setup operating at a mid-infrared wavelength. Alice sends polarization-coded pseudo-single photons from a Quantum Cascade Laser at 4.6 μm to Bob, who uses a nonlinear crystal and a Silicon Avalanche Photodiode to perform the detection via Sum Frequency Generation. Theoretical predictions, based on a proof-of-principle exp...
Wireless sensor networks is composed of a large number of randomly deployed sensor nodes with limited computing ability and memory space. These characteristics gives rise to much challenge to key agreement. General key agreement schemes like KDC, PKI and Diffie-Hellman key exchange schemes are not applicable to the sensor networks. Several key distribution schemes have been proposed specificall...
Random numbers have a wide range of applications such as encryption, Monte Carlo simulation, statistical analysis, and lottery. The indeterministic nature of quantum mechanics allows us to construct quantum random number generators (QRNGs) whose output cannot be predicted. The generation speed is essential for practical applications, such as high-speed quantum key distribution systems. Here, we...
We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.
Key pre-distribution is a well-known technique for ensuring secure communication among sensors deployed in an ad-hoc manner to form a sensor network. Secure paths can be established between any two sensors, where adjacent sensors on the path share a (predistributed) secret key. Several results have been presented recently on random key predistribution schemes [6] and [2]. In this paper, we prop...
At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to en-crypt in such a way that the receiver can be traced by an authority having additional information. This paper shows that the proposed scheme does not have the required properties, by devising three non-speciied protocols misleading the authority. We also discuss how to repair Desmedt's scheme, such that our attacks are n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید