نتایج جستجو برای: distribution key

تعداد نتایج: 1126998  

Journal: :CoRR 2014
Lachlan J. Gunn Andrew Allison Derek Abbott

The Kish key distribution system has been proposed as a classical alternative to quantum key distribution. The idealized Kish scheme elegantly promises secure key distribution by exploiting thermal noise in a transmission line. However, it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission line connecting its endpoints. We introduce a novel attac...

Journal: :CoRR 2013
Rui-Rui Zhou Li Yang

In an electronic voting protocol, a distributed scheme can be used for forbidding the malicious acts of the voting administrator and the counter during the election, but it cannot prevent them from collaborating to trace the ballots and destroy their privacy after the election. We present a distributed anonymous quantum key distribution scheme and further construct a distributed quantum electio...

2012
Michel Boyer Ran Gelles Tal Mor

We consider quantum key distribution implementations in which the receiver’s apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver’s equipment. The attack we pre...

2014
S. Nagaprasad G. Srinivasa

Quantum Key Distribution (Q.K.D.) provides us a protected communication channel. In present days we have some latest problems existing in Quantum key distribution. Let us look in to the Quantum key distribution Research analysis which provides us the Information about BB84 Protocol, using reducing laser light is used as a Photon Source, Protected keys could not be generated. The reason is it’s ...

2007
M. A Sfaxi I. Tashi S. Ghernaouti Hélie

To achieve an efficient use of cryptographic mechanisms to secure ICT infrastructures, we propose to integrate quantum key distribution into main communication protocols. This article gives some benefits and contributions of the use of quantum Key Distribution to enforce ICT security level. Several feasibility ways to implement solutions based on quantum key distribution are proposed.

Journal: :CoRR 2017
Michel Boyer Matty Katz Rotem Liss Tal Mor

Quantum Key Distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semi-quantum Key Distribution (SQKD) protocols, such as “QKD with classical Bob” and “QKD with classical Alice” (that have both been proven robust), achieve this goal even if one of the parties is classical. However, the currently existing SQKD protocols are not experimentally feas...

2007
Shun Watanabe

We evaluate the amount of secret key that can be obtained from the incompatible measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. Moreover, the entropic uncertainty principle implies that one cannot extract the secret key from both compatible measurements and incompatible ones simultaneously.

2008
Denis Sych Gerd Leuchs

We present a new protocol for quantum key distribution using discrete phase-shift encoding with continuous variables. The novelty of the protocol is multi letter alphabets represented by coherent states of light with fixed amplitude and variable phase. Information is encoded in the phase of a coherent states which can be chosen from a regular discrete set consisting of an arbitrary number of le...

2011
Chirag Dhara Lluis Masanes Stefano Pironio Antonio Acin

Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and req...

2016
Toshihiko Sasaki Kiyoshi Tamaki Masato Koashi

In many quantum key distribution (QKD) protocols, the receiver has to randomly change a measurement basis for each pulse or each train of pulses. This random change requires us to generate a huge amount of random numbers. It is also cumbersome for some QKD protocols, such as the round-robin differential phase shift QKD protocol, to change the basis rapidly. In this presentation, we address thes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید